General

  • Target

    10482_Video_Oynatıcı.apk

  • Size

    2.8MB

  • Sample

    210906-t1zgmsbcd4

  • MD5

    ffce59f44fe794ceb53c215d9c8bd17f

  • SHA1

    0782156341937276c0883946f91187e2e2c34c86

  • SHA256

    a0de1add961f3a9bf6e2e391489fdbac244932352421055f23f34c93c82b8856

  • SHA512

    8558f92dd5a7238c87277db05dd537b8ecb26a314dbc0483478bf1cf0a251a2d4cb044ee4347d766293d273ca89a05f6d7aa9bbfe5567aace682b3a0640b71b3

Malware Config

Extracted

Family

hydra

C2

http://kerrihuffman1237.online

Targets

    • Target

      10482_Video_Oynatıcı.apk

    • Size

      2.8MB

    • MD5

      ffce59f44fe794ceb53c215d9c8bd17f

    • SHA1

      0782156341937276c0883946f91187e2e2c34c86

    • SHA256

      a0de1add961f3a9bf6e2e391489fdbac244932352421055f23f34c93c82b8856

    • SHA512

      8558f92dd5a7238c87277db05dd537b8ecb26a314dbc0483478bf1cf0a251a2d4cb044ee4347d766293d273ca89a05f6d7aa9bbfe5567aace682b3a0640b71b3

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks