General

  • Target

    FlashPlayerV3.8.apk

  • Size

    7.6MB

  • Sample

    211014-x6ek7sbaam

  • MD5

    2e342b396f42b80a7e9c148904e73959

  • SHA1

    10388c6b404fdbd652239e1964c4841ee0ad3bae

  • SHA256

    d00dc910e6f8ea1ba46d4af40d428562cd8563222db4fc0a60fe5bb1fae322fe

  • SHA512

    18639bda61af40087dc3dc35a75d2d21857ef429827e2005c501e24b3eac028f4c6e12f74e196cb66ef82c8e0808bfe91f741c6f8611181bc4ff2a306a978665

Malware Config

Targets

    • Target

      FlashPlayerV3.8.apk

    • Size

      7.6MB

    • MD5

      2e342b396f42b80a7e9c148904e73959

    • SHA1

      10388c6b404fdbd652239e1964c4841ee0ad3bae

    • SHA256

      d00dc910e6f8ea1ba46d4af40d428562cd8563222db4fc0a60fe5bb1fae322fe

    • SHA512

      18639bda61af40087dc3dc35a75d2d21857ef429827e2005c501e24b3eac028f4c6e12f74e196cb66ef82c8e0808bfe91f741c6f8611181bc4ff2a306a978665

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks