General

  • Target

    43891_Video_Oynatıcı.apk

  • Size

    7.3MB

  • Sample

    211015-plm3vabfbr

  • MD5

    7433796ca18baa6386c024c07cace94f

  • SHA1

    68ea3944453fafac292c15d7ac439a80bd8cb89f

  • SHA256

    6005f5569a6240c36f07de53438df1615ea6f000000fa5452d5a8870afe6336b

  • SHA512

    5df4e4a28fa05b0d47c9e05edd069fdaa04fe1ca8dbe7bd4eb70aee6e664ce91bd0a63aab71749841d2f8fd969a333b13ed19c356f953cbc4688ce6e7ceffc86

Malware Config

Targets

    • Target

      43891_Video_Oynatıcı.apk

    • Size

      7.3MB

    • MD5

      7433796ca18baa6386c024c07cace94f

    • SHA1

      68ea3944453fafac292c15d7ac439a80bd8cb89f

    • SHA256

      6005f5569a6240c36f07de53438df1615ea6f000000fa5452d5a8870afe6336b

    • SHA512

      5df4e4a28fa05b0d47c9e05edd069fdaa04fe1ca8dbe7bd4eb70aee6e664ce91bd0a63aab71749841d2f8fd969a333b13ed19c356f953cbc4688ce6e7ceffc86

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks