General

  • Target

    ce132d90947a4965a4c9db94a08052af1db501962dae5df4c59cf4c1c5d922c8.apk

  • Size

    7.8MB

  • Sample

    211108-tgj8lshedp

  • MD5

    70a2f417d4a8db9ecb46226d25ec9163

  • SHA1

    c958d3c902fbca9e7245f260aaef676a3c2f09eb

  • SHA256

    ce132d90947a4965a4c9db94a08052af1db501962dae5df4c59cf4c1c5d922c8

  • SHA512

    3f9a88458a40e991afd57091c16382449353641d8836ee2a145036ef9a541fff461ce367aaa56b75f760e7d5921202a253346f440dc12ccabbd9e9aa49b01a40

Malware Config

Targets

    • Target

      ce132d90947a4965a4c9db94a08052af1db501962dae5df4c59cf4c1c5d922c8.apk

    • Size

      7.8MB

    • MD5

      70a2f417d4a8db9ecb46226d25ec9163

    • SHA1

      c958d3c902fbca9e7245f260aaef676a3c2f09eb

    • SHA256

      ce132d90947a4965a4c9db94a08052af1db501962dae5df4c59cf4c1c5d922c8

    • SHA512

      3f9a88458a40e991afd57091c16382449353641d8836ee2a145036ef9a541fff461ce367aaa56b75f760e7d5921202a253346f440dc12ccabbd9e9aa49b01a40

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks