General

  • Target

    26574_Video_Oynatıcı.apk

  • Size

    3.8MB

  • Sample

    210930-he8bwaggfr

  • MD5

    5cb878467cbb030bbaf09c6f6ab524f4

  • SHA1

    383e2f00b78eee433a9e8a2a3273e2fc15e52cfc

  • SHA256

    20c9ada9d408cd2a2e8202574deb7e0ceb04b9366884a4364c1ab8197d91748e

  • SHA512

    898058050b56d99cf22170c0fd7e5a142a7f3304da40fda1d3bd130b6672d0d3dd51448a29ea6e49218b083ee01f88134b8f9816411bdf774c1724f830096192

Malware Config

Extracted

Family

hydra

C2

http://lolamaefarmer5823.online

Targets

    • Target

      26574_Video_Oynatıcı.apk

    • Size

      3.8MB

    • MD5

      5cb878467cbb030bbaf09c6f6ab524f4

    • SHA1

      383e2f00b78eee433a9e8a2a3273e2fc15e52cfc

    • SHA256

      20c9ada9d408cd2a2e8202574deb7e0ceb04b9366884a4364c1ab8197d91748e

    • SHA512

      898058050b56d99cf22170c0fd7e5a142a7f3304da40fda1d3bd130b6672d0d3dd51448a29ea6e49218b083ee01f88134b8f9816411bdf774c1724f830096192

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks