General

  • Target

    commerzbank.apk

  • Size

    7.8MB

  • Sample

    210920-mm9xwsdga9

  • MD5

    33930ad392c91562b0976fcb11da8573

  • SHA1

    5beebbc6c1b2d1f7ea09e2b5052e0485a537ab44

  • SHA256

    b461ad02bf71d2334a7c786e9de42b00515fe6093c06366f0308e5d99a26da7d

  • SHA512

    fb8569a44933182c422bfbb591193d4ea5941d1660dacd3a4ee7e18902c9fd52ed118d6c60a20f8ff3c38d115962b54128991bcc43be4944589a8b38dfa253c2

Malware Config

Targets

    • Target

      commerzbank.apk

    • Size

      7.8MB

    • MD5

      33930ad392c91562b0976fcb11da8573

    • SHA1

      5beebbc6c1b2d1f7ea09e2b5052e0485a537ab44

    • SHA256

      b461ad02bf71d2334a7c786e9de42b00515fe6093c06366f0308e5d99a26da7d

    • SHA512

      fb8569a44933182c422bfbb591193d4ea5941d1660dacd3a4ee7e18902c9fd52ed118d6c60a20f8ff3c38d115962b54128991bcc43be4944589a8b38dfa253c2

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks