General

  • Target

    02368_Video_Oynatıcı.apk

  • Size

    2.8MB

  • Sample

    210904-12r8aahfem

  • MD5

    46c87284911cae5becb72f5025e9d73b

  • SHA1

    b76983784c8da31f63c637ee0dcda228a5824d21

  • SHA256

    fe6255f07855951d3ef507a76a564ed18d7526d86a53a1761f505b6eecc5c5af

  • SHA512

    89599ad35fd3ec46a7a2561252d50eb066bea7bdbda9eeec1e14dd83691b1297b8009322c9a04a154eba8220638ec8d270980abae6d4dc306d5b3322237a35e2

Malware Config

Targets

    • Target

      02368_Video_Oynatıcı.apk

    • Size

      2.8MB

    • MD5

      46c87284911cae5becb72f5025e9d73b

    • SHA1

      b76983784c8da31f63c637ee0dcda228a5824d21

    • SHA256

      fe6255f07855951d3ef507a76a564ed18d7526d86a53a1761f505b6eecc5c5af

    • SHA512

      89599ad35fd3ec46a7a2561252d50eb066bea7bdbda9eeec1e14dd83691b1297b8009322c9a04a154eba8220638ec8d270980abae6d4dc306d5b3322237a35e2

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks