General

  • Target

    98173_Video_Oynatıcı.apk

  • Size

    2.8MB

  • Sample

    210904-12sh2seed3

  • MD5

    80d0ea203dd51b7689349cee6e0d2e88

  • SHA1

    8f160183896f65aa9b1524382279448f1010d021

  • SHA256

    6253cac300eabed08691f1dd70f93ce86513ce98d2a577007efa0cb3a2560aa5

  • SHA512

    b2588300626f774d150af1a0e4ed3cd58212b23e6b75e5e5347a9b2d766d14810d00b27f26e1d85c5e1e28b01d226dfd20c2d9a817b37b879f10bb38e25307ea

Malware Config

Extracted

Family

hydra

C2

http://kerrihuffman1237.online

Targets

    • Target

      98173_Video_Oynatıcı.apk

    • Size

      2.8MB

    • MD5

      80d0ea203dd51b7689349cee6e0d2e88

    • SHA1

      8f160183896f65aa9b1524382279448f1010d021

    • SHA256

      6253cac300eabed08691f1dd70f93ce86513ce98d2a577007efa0cb3a2560aa5

    • SHA512

      b2588300626f774d150af1a0e4ed3cd58212b23e6b75e5e5347a9b2d766d14810d00b27f26e1d85c5e1e28b01d226dfd20c2d9a817b37b879f10bb38e25307ea

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks