General

  • Target

    12432f64368a4fc826e229b23f30e439dd0bbff9c34af9f110ce0af4a2318e43.apk

  • Size

    7.6MB

  • Sample

    210915-jw4wfsdcan

  • MD5

    aaa0ea1bccbf4598c107efe3db3ec0c1

  • SHA1

    4415ca11b6ea4b574bf23ca38a9898899b276ed3

  • SHA256

    12432f64368a4fc826e229b23f30e439dd0bbff9c34af9f110ce0af4a2318e43

  • SHA512

    63b0499c5fc7bb84f88e7c3412a748299ab41190ede9b23c5dc6b0bef0a5e7fdbe05f5dfc2d078ceca1d5e41de604da3b1c8080adea1613134173d5509e882e1

Malware Config

Targets

    • Target

      12432f64368a4fc826e229b23f30e439dd0bbff9c34af9f110ce0af4a2318e43.apk

    • Size

      7.6MB

    • MD5

      aaa0ea1bccbf4598c107efe3db3ec0c1

    • SHA1

      4415ca11b6ea4b574bf23ca38a9898899b276ed3

    • SHA256

      12432f64368a4fc826e229b23f30e439dd0bbff9c34af9f110ce0af4a2318e43

    • SHA512

      63b0499c5fc7bb84f88e7c3412a748299ab41190ede9b23c5dc6b0bef0a5e7fdbe05f5dfc2d078ceca1d5e41de604da3b1c8080adea1613134173d5509e882e1

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks