General

  • Target

    75041_Video_Oynatıcı.apk

  • Size

    3.8MB

  • Sample

    210930-hx2l2sgge4

  • MD5

    b1992b19bac66f610720c60f86b1fc88

  • SHA1

    fd1ecd92102553e872b1ffbf50cd1aa2ae04b652

  • SHA256

    625695ea0c246de98e12e2f5f8a5f05d23f03ffb2267a9f8c43429e1eac97499

  • SHA512

    e51a5e21b17d13599c9ebff6b98020abdbe68c15212ad367e7b1184099223b12448e30adbebd106df3df5aca2ab5ea831ef60856700b137811ac6eb14a49f7e2

Malware Config

Extracted

Family

hydra

C2

http://lolamaefarmer5823.online

Targets

    • Target

      75041_Video_Oynatıcı.apk

    • Size

      3.8MB

    • MD5

      b1992b19bac66f610720c60f86b1fc88

    • SHA1

      fd1ecd92102553e872b1ffbf50cd1aa2ae04b652

    • SHA256

      625695ea0c246de98e12e2f5f8a5f05d23f03ffb2267a9f8c43429e1eac97499

    • SHA512

      e51a5e21b17d13599c9ebff6b98020abdbe68c15212ad367e7b1184099223b12448e30adbebd106df3df5aca2ab5ea831ef60856700b137811ac6eb14a49f7e2

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks