General

  • Target

    1c45216f30d1413e6330622d51a94d363d969ae02fb160addc93c33d00545d1c.apk

  • Size

    7.5MB

  • Sample

    210922-lvhypscbb2

  • MD5

    68649c89a9d7aa4afe2a3ab86362ff76

  • SHA1

    70e18e1cb263ed17dd46c8f382351b0911c80232

  • SHA256

    1c45216f30d1413e6330622d51a94d363d969ae02fb160addc93c33d00545d1c

  • SHA512

    beef84d74993992cd8e7fc1bbe13113bee3a1cbec91ed6bcccd16fc6dbe6dc7eb404b3bdc43679c232005621d3f69e4e52068a9df1b2aa1ee15f820c12b60dd1

Malware Config

Targets

    • Target

      1c45216f30d1413e6330622d51a94d363d969ae02fb160addc93c33d00545d1c.apk

    • Size

      7.5MB

    • MD5

      68649c89a9d7aa4afe2a3ab86362ff76

    • SHA1

      70e18e1cb263ed17dd46c8f382351b0911c80232

    • SHA256

      1c45216f30d1413e6330622d51a94d363d969ae02fb160addc93c33d00545d1c

    • SHA512

      beef84d74993992cd8e7fc1bbe13113bee3a1cbec91ed6bcccd16fc6dbe6dc7eb404b3bdc43679c232005621d3f69e4e52068a9df1b2aa1ee15f820c12b60dd1

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks