General

  • Target

    b087415d28ceddcba34be7cdb3dbced6a11ac15a6f818a45d38bc35402a9cd81.apk

  • Size

    7.5MB

  • Sample

    210922-lvmlwscbb5

  • MD5

    827b994a520602e2fa9065b36b1bbfe6

  • SHA1

    10cf183b4dd3dc32c4dd151e6b4ef6bcf02ff9c3

  • SHA256

    b087415d28ceddcba34be7cdb3dbced6a11ac15a6f818a45d38bc35402a9cd81

  • SHA512

    a83fe14ccd043319ff545db80df6fc2309644c0566345508e024b0b939ec906ff53dd3ccee82150c7c7b5dd0fcb15c8a792cc1a26c36b5f76e1e0cc2f5e54135

Malware Config

Targets

    • Target

      b087415d28ceddcba34be7cdb3dbced6a11ac15a6f818a45d38bc35402a9cd81.apk

    • Size

      7.5MB

    • MD5

      827b994a520602e2fa9065b36b1bbfe6

    • SHA1

      10cf183b4dd3dc32c4dd151e6b4ef6bcf02ff9c3

    • SHA256

      b087415d28ceddcba34be7cdb3dbced6a11ac15a6f818a45d38bc35402a9cd81

    • SHA512

      a83fe14ccd043319ff545db80df6fc2309644c0566345508e024b0b939ec906ff53dd3ccee82150c7c7b5dd0fcb15c8a792cc1a26c36b5f76e1e0cc2f5e54135

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks