General

  • Target

    1d03e9b69f64f8f4be3559a3e3f3b3ff04426d18c48adb213960da8c5f98b741.apk

  • Size

    5.4MB

  • Sample

    211004-r2wq2agegj

  • MD5

    7ff0122bb9ff26c4547b00fb21859995

  • SHA1

    fa29838cbacb2104da9d85b5cd9be1e660389e75

  • SHA256

    1d03e9b69f64f8f4be3559a3e3f3b3ff04426d18c48adb213960da8c5f98b741

  • SHA512

    aa70fc0edfa3d38e48a44bd9075d9893a8d5a71cdd9dca61abeb97cdeccbc68e408a95844b941795fab18b327f07dce34f9ec3334bc126041096fdc8b63f8c01

Malware Config

Targets

    • Target

      1d03e9b69f64f8f4be3559a3e3f3b3ff04426d18c48adb213960da8c5f98b741.apk

    • Size

      5.4MB

    • MD5

      7ff0122bb9ff26c4547b00fb21859995

    • SHA1

      fa29838cbacb2104da9d85b5cd9be1e660389e75

    • SHA256

      1d03e9b69f64f8f4be3559a3e3f3b3ff04426d18c48adb213960da8c5f98b741

    • SHA512

      aa70fc0edfa3d38e48a44bd9075d9893a8d5a71cdd9dca61abeb97cdeccbc68e408a95844b941795fab18b327f07dce34f9ec3334bc126041096fdc8b63f8c01

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks