General

  • Target

    c671393f6b927e60c76c284f6a645c219094430797438f9c020a10399e3f094f.apk

  • Size

    8.2MB

  • Sample

    210902-ywm1jmf96x

  • MD5

    9e6bd047e07dad9342f72d25e6d33c37

  • SHA1

    0320259263fc5fc400b077b6078efc12e12bf2c4

  • SHA256

    c671393f6b927e60c76c284f6a645c219094430797438f9c020a10399e3f094f

  • SHA512

    39f9f987fa2261bd7af9d75b34069a32d27fa27e71007f4874d15831f846877e3300f13d2ba75572e32943378567460665cdb6d08b38193f3c21fae18c6d5035

Malware Config

Targets

    • Target

      c671393f6b927e60c76c284f6a645c219094430797438f9c020a10399e3f094f.apk

    • Size

      8.2MB

    • MD5

      9e6bd047e07dad9342f72d25e6d33c37

    • SHA1

      0320259263fc5fc400b077b6078efc12e12bf2c4

    • SHA256

      c671393f6b927e60c76c284f6a645c219094430797438f9c020a10399e3f094f

    • SHA512

      39f9f987fa2261bd7af9d75b34069a32d27fa27e71007f4874d15831f846877e3300f13d2ba75572e32943378567460665cdb6d08b38193f3c21fae18c6d5035

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks