General

  • Target

    commerzbank.apk

  • Size

    8.6MB

  • Sample

    210927-jx8k2agabn

  • MD5

    1586c52d0909cee231653941908e33ee

  • SHA1

    f2d7564c0a1253308facf50008c1dd52629bd623

  • SHA256

    55af70f1d700bb8f18c425c5cf57837d7b552d81e5ca33796d01c6a116b8f72f

  • SHA512

    a40627b4fce98f86183d450a61184f6eb04664dde3ef60e60a3cdade5e1a32f6b75447b3b0850f589e7e7a395b745d6f18acb6b1bc774d3444c10b41474a48ba

Malware Config

Targets

    • Target

      commerzbank.apk

    • Size

      8.6MB

    • MD5

      1586c52d0909cee231653941908e33ee

    • SHA1

      f2d7564c0a1253308facf50008c1dd52629bd623

    • SHA256

      55af70f1d700bb8f18c425c5cf57837d7b552d81e5ca33796d01c6a116b8f72f

    • SHA512

      a40627b4fce98f86183d450a61184f6eb04664dde3ef60e60a3cdade5e1a32f6b75447b3b0850f589e7e7a395b745d6f18acb6b1bc774d3444c10b41474a48ba

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks