General

  • Target

    commerzbank.apk

  • Size

    7.8MB

  • Sample

    210921-jzf9kabdgr

  • MD5

    c47cdae511e1dad0328abdfdbe60bdc3

  • SHA1

    cd9c039963cc6ad28677041d5096fc6098cd6e27

  • SHA256

    54318a908bc0d347fb56fe48ff7ca7e16fe5eec1d69e7248c902eac0edd45a5b

  • SHA512

    31211f2a1aab4552bbf28c9fdbc9f051ab2eebdbdde05cfaf7bca1dafeb8eb54939523507776399257f31fcf8dcc219510fa9a5d47f867b88ff35e85558561c8

Malware Config

Targets

    • Target

      commerzbank.apk

    • Size

      7.8MB

    • MD5

      c47cdae511e1dad0328abdfdbe60bdc3

    • SHA1

      cd9c039963cc6ad28677041d5096fc6098cd6e27

    • SHA256

      54318a908bc0d347fb56fe48ff7ca7e16fe5eec1d69e7248c902eac0edd45a5b

    • SHA512

      31211f2a1aab4552bbf28c9fdbc9f051ab2eebdbdde05cfaf7bca1dafeb8eb54939523507776399257f31fcf8dcc219510fa9a5d47f867b88ff35e85558561c8

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks