General

  • Target

    61524_Video_Oynatıcı (1).apk

  • Size

    2.8MB

  • Sample

    210904-12sh2shfen

  • MD5

    444f7fa5b7195e5ab4bd08f2674b0d94

  • SHA1

    2b568ef48ee55b58411f84707f10078e78dee4c2

  • SHA256

    384b2f4bbd5da1e58d66339557c8af0ba67f42059653da081b0c69e1cc1df4c4

  • SHA512

    059152d4fe1389625c4cf657d606ade770b503fa100fd4117ca1068c382d847a22a94f0fc27d2d7446f0029840d853bffb29a9ed325a4f83b56465fdb7c25c08

Malware Config

Extracted

Family

hydra

C2

http://kerrihuffman1237.online

Targets

    • Target

      61524_Video_Oynatıcı (1).apk

    • Size

      2.8MB

    • MD5

      444f7fa5b7195e5ab4bd08f2674b0d94

    • SHA1

      2b568ef48ee55b58411f84707f10078e78dee4c2

    • SHA256

      384b2f4bbd5da1e58d66339557c8af0ba67f42059653da081b0c69e1cc1df4c4

    • SHA512

      059152d4fe1389625c4cf657d606ade770b503fa100fd4117ca1068c382d847a22a94f0fc27d2d7446f0029840d853bffb29a9ed325a4f83b56465fdb7c25c08

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.