General

  • Target

    psk.apk

  • Size

    8.6MB

  • Sample

    211118-qv874sgcd4

  • MD5

    4076db4387eb8ddf8f2010e3db8c8b07

  • SHA1

    3555274dae63d29a66a68211ba6244b34ccab1c4

  • SHA256

    fe9cfc5046c583a7b28fa506cd33e636d27310b14240247625c693444a27336f

  • SHA512

    a98825781c40ea2bb99e337d349bc6b2b935d9f81837558a96ad2f622da92e79302c4c16715eee6acf6de2862716cbe5fd57323a231dc98c191450a17827eea3

Malware Config

Targets

    • Target

      psk.apk

    • Size

      8.6MB

    • MD5

      4076db4387eb8ddf8f2010e3db8c8b07

    • SHA1

      3555274dae63d29a66a68211ba6244b34ccab1c4

    • SHA256

      fe9cfc5046c583a7b28fa506cd33e636d27310b14240247625c693444a27336f

    • SHA512

      a98825781c40ea2bb99e337d349bc6b2b935d9f81837558a96ad2f622da92e79302c4c16715eee6acf6de2862716cbe5fd57323a231dc98c191450a17827eea3

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks