General

  • Target

    51490_Video_Oynatıcı.apk

  • Size

    3.8MB

  • Sample

    210930-he8bwaggb8

  • MD5

    9ef00934e62771f18d6ff4e6d2b194ac

  • SHA1

    782bedd376ce2af8c5f5abe83d903dbe028ed387

  • SHA256

    743409c2aca5a493af60a3e700c25af2de88c134ce25488ab7f713c778945b39

  • SHA512

    c3bbfc1d5984fb05a278d530727993c7fd336a5a7ce1a6ed7a8e8cfd95587ae6cd44b5b0b98fe6ef584962aa4f3adaa0f4594569cebad0d7de0bb0d82a90baaf

Malware Config

Targets

    • Target

      51490_Video_Oynatıcı.apk

    • Size

      3.8MB

    • MD5

      9ef00934e62771f18d6ff4e6d2b194ac

    • SHA1

      782bedd376ce2af8c5f5abe83d903dbe028ed387

    • SHA256

      743409c2aca5a493af60a3e700c25af2de88c134ce25488ab7f713c778945b39

    • SHA512

      c3bbfc1d5984fb05a278d530727993c7fd336a5a7ce1a6ed7a8e8cfd95587ae6cd44b5b0b98fe6ef584962aa4f3adaa0f4594569cebad0d7de0bb0d82a90baaf

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks