General

  • Target

    81295_Video_Oynatıcı.apk

  • Size

    7.3MB

  • Sample

    211015-dbl71saeb2

  • MD5

    17fe5d41d3ddc9ae0fd5a50ddefefb58

  • SHA1

    c953103f0d0464e5c6f4d904daf0acd07fd9e086

  • SHA256

    e51f32dbe18d52eafe2ac65f77f84450fd279fecd0278b0df95ce654017dddd2

  • SHA512

    020de77f4e91bdaebe0dba0c87164177fc5bd7d971d30f9ec676b036e0343b1f97c5754d3fc02653ea86833273f266ef46c7d4082be0d2e9e05b75d61826a5a2

Malware Config

Targets

    • Target

      81295_Video_Oynatıcı.apk

    • Size

      7.3MB

    • MD5

      17fe5d41d3ddc9ae0fd5a50ddefefb58

    • SHA1

      c953103f0d0464e5c6f4d904daf0acd07fd9e086

    • SHA256

      e51f32dbe18d52eafe2ac65f77f84450fd279fecd0278b0df95ce654017dddd2

    • SHA512

      020de77f4e91bdaebe0dba0c87164177fc5bd7d971d30f9ec676b036e0343b1f97c5754d3fc02653ea86833273f266ef46c7d4082be0d2e9e05b75d61826a5a2

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks