General

  • Target

    db.apk

  • Size

    8.4MB

  • Sample

    211001-lasmeabddn

  • MD5

    3485b084ca43e53fab17fd5825796c93

  • SHA1

    a0ba124f9bf287469b0cffe679648924c57754b9

  • SHA256

    f489e424d946083b0167321ea10fa87b48f05e85386609e810bbf6e4778efd6f

  • SHA512

    a107296bec24a62138349830056a8864cacc6768e03e02c034cf5c4b56866058fe4a5bb028a8e02bee15de87131e828d1cd7de477f6a420105234459b5c46a27

Malware Config

Targets

    • Target

      db.apk

    • Size

      8.4MB

    • MD5

      3485b084ca43e53fab17fd5825796c93

    • SHA1

      a0ba124f9bf287469b0cffe679648924c57754b9

    • SHA256

      f489e424d946083b0167321ea10fa87b48f05e85386609e810bbf6e4778efd6f

    • SHA512

      a107296bec24a62138349830056a8864cacc6768e03e02c034cf5c4b56866058fe4a5bb028a8e02bee15de87131e828d1cd7de477f6a420105234459b5c46a27

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks