General

  • Target

    721cf0dd987f57c4aca4690c8d1030a84dda751676d3842ff4f2543939a52029.apk

  • Size

    7.5MB

  • Sample

    210922-lve7tacba8

  • MD5

    f5e0177cfdf7967f1f4f08f982fd0c95

  • SHA1

    9089272032b8d7ca33615200cc71405ca477c9d4

  • SHA256

    721cf0dd987f57c4aca4690c8d1030a84dda751676d3842ff4f2543939a52029

  • SHA512

    1ad5a55ec288aa541d83e98fb3ab641bab5511a51e08056994b87d60570ca78c649fcd4e84fd508e5f756f531e38e305b9503c19b97417023dfa8b197e9aab2c

Malware Config

Targets

    • Target

      721cf0dd987f57c4aca4690c8d1030a84dda751676d3842ff4f2543939a52029.apk

    • Size

      7.5MB

    • MD5

      f5e0177cfdf7967f1f4f08f982fd0c95

    • SHA1

      9089272032b8d7ca33615200cc71405ca477c9d4

    • SHA256

      721cf0dd987f57c4aca4690c8d1030a84dda751676d3842ff4f2543939a52029

    • SHA512

      1ad5a55ec288aa541d83e98fb3ab641bab5511a51e08056994b87d60570ca78c649fcd4e84fd508e5f756f531e38e305b9503c19b97417023dfa8b197e9aab2c

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks