Resubmissions

12-11-2021 21:13

211112-z2yvdsbcaq 10

General

  • Target

    155e5be1a29269f7016f9dbb1a6f62f0

  • Size

    9.0MB

  • Sample

    211112-z2yvdsbcaq

  • MD5

    155e5be1a29269f7016f9dbb1a6f62f0

  • SHA1

    81a8c8fe26f5607c3aec21592ddb866460467104

  • SHA256

    0d9df9ccb56f5fc3c7149704fe648ad6d3666c1da3413dfba3cf4b11cbb5f9be

  • SHA512

    cf0932b7bd4f2ebe9ce07ce6f2f051b40b50103b752d2c098ceb6fadad505c251b58ef574393e8dec8d99304ddeeda0cf92704408fc1e0491fe116d2f72d32ea

Malware Config

Targets

    • Target

      155e5be1a29269f7016f9dbb1a6f62f0

    • Size

      9.0MB

    • MD5

      155e5be1a29269f7016f9dbb1a6f62f0

    • SHA1

      81a8c8fe26f5607c3aec21592ddb866460467104

    • SHA256

      0d9df9ccb56f5fc3c7149704fe648ad6d3666c1da3413dfba3cf4b11cbb5f9be

    • SHA512

      cf0932b7bd4f2ebe9ce07ce6f2f051b40b50103b752d2c098ceb6fadad505c251b58ef574393e8dec8d99304ddeeda0cf92704408fc1e0491fe116d2f72d32ea

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks