General

  • Target

    commerzbank.apk

  • Size

    8.8MB

  • Sample

    211005-qy4rsshha7

  • MD5

    c820b0067bb90bebed17a402715d06eb

  • SHA1

    1838e61f495471f6aa23c293bccd4e715d788b0b

  • SHA256

    9a0339b27486cc1ab1bd76949e813a9a76df0226f8fdc5742e05f5008a597d10

  • SHA512

    914abcd295550de3487835e40cc16c85da94487bcc677aba19e5a71a2c8d12252928c50407c48f0a2470f2ed088e108c64b0a4649477ff59cc1027e8df9b99b8

Malware Config

Targets

    • Target

      commerzbank.apk

    • Size

      8.8MB

    • MD5

      c820b0067bb90bebed17a402715d06eb

    • SHA1

      1838e61f495471f6aa23c293bccd4e715d788b0b

    • SHA256

      9a0339b27486cc1ab1bd76949e813a9a76df0226f8fdc5742e05f5008a597d10

    • SHA512

      914abcd295550de3487835e40cc16c85da94487bcc677aba19e5a71a2c8d12252928c50407c48f0a2470f2ed088e108c64b0a4649477ff59cc1027e8df9b99b8

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks