General

  • Target

    61305_Video_Oynatıcı.apk

  • Size

    7.5MB

  • Sample

    211011-27d4aaadg8

  • MD5

    e1faee56c0a0fbe2a7ecc47d8c7ffc6c

  • SHA1

    86a4db73852dd8f6dc2794cca257d197fa99c4b9

  • SHA256

    d190fd3c695e2ca36235832834912ed02f3d64038600d525991c8024c6196839

  • SHA512

    fb809f44f516240b565ed7e34df401748b7a89211918215d58aad519f7a6a65066ae4b7177dec8292d805c7c87ce45a68b878cbd5b56c5f5d6efb56dc2d5f00a

Malware Config

Targets

    • Target

      61305_Video_Oynatıcı.apk

    • Size

      7.5MB

    • MD5

      e1faee56c0a0fbe2a7ecc47d8c7ffc6c

    • SHA1

      86a4db73852dd8f6dc2794cca257d197fa99c4b9

    • SHA256

      d190fd3c695e2ca36235832834912ed02f3d64038600d525991c8024c6196839

    • SHA512

      fb809f44f516240b565ed7e34df401748b7a89211918215d58aad519f7a6a65066ae4b7177dec8292d805c7c87ce45a68b878cbd5b56c5f5d6efb56dc2d5f00a

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks