General

  • Target

    26574_Video_Oynatıcı.apk

  • Size

    3.8MB

  • Sample

    210930-hx2l2sgge3

  • MD5

    5cb878467cbb030bbaf09c6f6ab524f4

  • SHA1

    383e2f00b78eee433a9e8a2a3273e2fc15e52cfc

  • SHA256

    20c9ada9d408cd2a2e8202574deb7e0ceb04b9366884a4364c1ab8197d91748e

  • SHA512

    898058050b56d99cf22170c0fd7e5a142a7f3304da40fda1d3bd130b6672d0d3dd51448a29ea6e49218b083ee01f88134b8f9816411bdf774c1724f830096192

Malware Config

Extracted

Family

hydra

C2

http://lolamaefarmer5823.online

Targets

    • Target

      26574_Video_Oynatıcı.apk

    • Size

      3.8MB

    • MD5

      5cb878467cbb030bbaf09c6f6ab524f4

    • SHA1

      383e2f00b78eee433a9e8a2a3273e2fc15e52cfc

    • SHA256

      20c9ada9d408cd2a2e8202574deb7e0ceb04b9366884a4364c1ab8197d91748e

    • SHA512

      898058050b56d99cf22170c0fd7e5a142a7f3304da40fda1d3bd130b6672d0d3dd51448a29ea6e49218b083ee01f88134b8f9816411bdf774c1724f830096192

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.