General

  • Target

    63952_Video_Oynatıcı.apk

  • Size

    4.1MB

  • Sample

    210923-qwbcgaedek

  • MD5

    2b241471796b58c106b033ef9b72bcaf

  • SHA1

    cb63f34668ed504d69a0a6522a3a50a440ad3517

  • SHA256

    dd2346922c42bb9dd6c76c03b4b965a6c001baf8d799437035202cf336a0521a

  • SHA512

    1a368ac6b4233c8310efca34033ad7a4d6b8e7c5466049fb54ce4a9a859f30b4a27c3ac5930afb51efc6007c6bae2381179e20f4a465d33ef5848a7bc3b9a863

Malware Config

Extracted

Family

hydra

C2

http://lolamaefarmer5823.online

Targets

    • Target

      63952_Video_Oynatıcı.apk

    • Size

      4.1MB

    • MD5

      2b241471796b58c106b033ef9b72bcaf

    • SHA1

      cb63f34668ed504d69a0a6522a3a50a440ad3517

    • SHA256

      dd2346922c42bb9dd6c76c03b4b965a6c001baf8d799437035202cf336a0521a

    • SHA512

      1a368ac6b4233c8310efca34033ad7a4d6b8e7c5466049fb54ce4a9a859f30b4a27c3ac5930afb51efc6007c6bae2381179e20f4a465d33ef5848a7bc3b9a863

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks