General

  • Target

    FlashPlayerV2H.apk

  • Size

    7.6MB

  • Sample

    210911-cjyqcaagd8

  • MD5

    238c28d1477fb08aa59cb4ec2c6203b6

  • SHA1

    adaf651f90e80eaf26b4848b88a7104f82d4508d

  • SHA256

    2d83480371cf081092bfa89628552abb461175333349122ead306bdc8ab9cf0b

  • SHA512

    0f9b4edd5fda97bde50c75b0461ded1d2b89f0668f3fb4dec6d869ba52122303f2e6bb214b40d7f0869fbf3fd5322731a164072ca2cc1674ef4e3c2c45494878

Malware Config

Targets

    • Target

      FlashPlayerV2H.apk

    • Size

      7.6MB

    • MD5

      238c28d1477fb08aa59cb4ec2c6203b6

    • SHA1

      adaf651f90e80eaf26b4848b88a7104f82d4508d

    • SHA256

      2d83480371cf081092bfa89628552abb461175333349122ead306bdc8ab9cf0b

    • SHA512

      0f9b4edd5fda97bde50c75b0461ded1d2b89f0668f3fb4dec6d869ba52122303f2e6bb214b40d7f0869fbf3fd5322731a164072ca2cc1674ef4e3c2c45494878

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks