General

  • Target

    db.apk

  • Size

    8.4MB

  • Sample

    210930-qy4f2ahgg9

  • MD5

    d060d2907ffde97e9bc6d4eb83974dae

  • SHA1

    9682f31628e832b074509b1482fefce50d0ea532

  • SHA256

    560bc78d6e227e068e99ca04beeac070e97a46d2792ef7b4292a4f125a516e53

  • SHA512

    caf096fe947b300f6a6e06d19d54f53148ab057bb01298381016deeac56f1ba6b2f0e04f1b1e86cba9b53c9cbf32aab3a87caf0450c0a26c07d956c730156bca

Malware Config

Targets

    • Target

      db.apk

    • Size

      8.4MB

    • MD5

      d060d2907ffde97e9bc6d4eb83974dae

    • SHA1

      9682f31628e832b074509b1482fefce50d0ea532

    • SHA256

      560bc78d6e227e068e99ca04beeac070e97a46d2792ef7b4292a4f125a516e53

    • SHA512

      caf096fe947b300f6a6e06d19d54f53148ab057bb01298381016deeac56f1ba6b2f0e04f1b1e86cba9b53c9cbf32aab3a87caf0450c0a26c07d956c730156bca

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks