General

  • Target

    83079_Video_Oynatıcı.apk

  • Size

    8.4MB

  • Sample

    211012-sb6zracee7

  • MD5

    0ad3ed18db22787964e625e4db85c296

  • SHA1

    a1f4dd7cd8ad949e59ad8680a457d681d24df2ac

  • SHA256

    74f3a191e941c68bbc7bf87515a12ae547e79eba4d9ffd5c2799a9c44b77dc2d

  • SHA512

    d2937b6f4cb270c911899f135453890b235a7aa74fc41e956654e96b099c5c5c2d3eb1b4ddb6e4a8efcf80f75598c1ad0396094b76f7aaf7be9d85c172eca694

Malware Config

Targets

    • Target

      83079_Video_Oynatıcı.apk

    • Size

      8.4MB

    • MD5

      0ad3ed18db22787964e625e4db85c296

    • SHA1

      a1f4dd7cd8ad949e59ad8680a457d681d24df2ac

    • SHA256

      74f3a191e941c68bbc7bf87515a12ae547e79eba4d9ffd5c2799a9c44b77dc2d

    • SHA512

      d2937b6f4cb270c911899f135453890b235a7aa74fc41e956654e96b099c5c5c2d3eb1b4ddb6e4a8efcf80f75598c1ad0396094b76f7aaf7be9d85c172eca694

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks