General

  • Target

    3f46243d7d6873d6605fe0123ccf298e422e756ad2550ed0f3cecfedd89bd1a9.apk

  • Size

    8.9MB

  • Sample

    211108-tmqycacfd3

  • MD5

    996cec48d6c948a2c7397e5e01e5b9f5

  • SHA1

    775646984ffe9c5f6854f6d4822599bbe354dae0

  • SHA256

    3f46243d7d6873d6605fe0123ccf298e422e756ad2550ed0f3cecfedd89bd1a9

  • SHA512

    13424a095528ef047a0cf638c7bb97b9555601cc7610b9fd84464a6fd25f43e6f16a13c044a3490e713c9c5980a6d64a466789c54ad63d7e9ae42024ee1e321a

Malware Config

Targets

    • Target

      3f46243d7d6873d6605fe0123ccf298e422e756ad2550ed0f3cecfedd89bd1a9.apk

    • Size

      8.9MB

    • MD5

      996cec48d6c948a2c7397e5e01e5b9f5

    • SHA1

      775646984ffe9c5f6854f6d4822599bbe354dae0

    • SHA256

      3f46243d7d6873d6605fe0123ccf298e422e756ad2550ed0f3cecfedd89bd1a9

    • SHA512

      13424a095528ef047a0cf638c7bb97b9555601cc7610b9fd84464a6fd25f43e6f16a13c044a3490e713c9c5980a6d64a466789c54ad63d7e9ae42024ee1e321a

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks