General

  • Target

    41037_Video_Oynatıcı.apk

  • Size

    7.3MB

  • Sample

    211015-xh3m5acagp

  • MD5

    2eb95b88fab546af95d509c94a26a930

  • SHA1

    cc0d10a420a0ec0ea3f96d89318af0ad325423d8

  • SHA256

    f6da0d9f1d74f2f80cd4d69183a78ccc1b3679689419262c9704787cea754726

  • SHA512

    4deabfb458934244fe84508df035430b6c8550834141d11818d73e5ff3de1123cd64bcce79cd5dee93d9d356ee05a1b474944a809cb1c4c5a2bf16bda55e97ee

Malware Config

Targets

    • Target

      41037_Video_Oynatıcı.apk

    • Size

      7.3MB

    • MD5

      2eb95b88fab546af95d509c94a26a930

    • SHA1

      cc0d10a420a0ec0ea3f96d89318af0ad325423d8

    • SHA256

      f6da0d9f1d74f2f80cd4d69183a78ccc1b3679689419262c9704787cea754726

    • SHA512

      4deabfb458934244fe84508df035430b6c8550834141d11818d73e5ff3de1123cd64bcce79cd5dee93d9d356ee05a1b474944a809cb1c4c5a2bf16bda55e97ee

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks