General

  • Target

    db.apk

  • Size

    9.2MB

  • Sample

    211118-qvn7yagcc9

  • MD5

    62f500d8d63a71a821f9de8932101be7

  • SHA1

    219008f34810ef684dbe0f3700fedea52d197a8e

  • SHA256

    a2c91743a0834cd1fb63c6965c581e1f5a57f1d2fcb226985423894ac814c93a

  • SHA512

    0236158fa2bea4a62870fc829c0e022a252b0e77aff999d6ca195160334cdccb0eb57d23fa5d830cc19b201d545aa8d63b95c9f9e1b49d9995ba07071837b283

Malware Config

Targets

    • Target

      db.apk

    • Size

      9.2MB

    • MD5

      62f500d8d63a71a821f9de8932101be7

    • SHA1

      219008f34810ef684dbe0f3700fedea52d197a8e

    • SHA256

      a2c91743a0834cd1fb63c6965c581e1f5a57f1d2fcb226985423894ac814c93a

    • SHA512

      0236158fa2bea4a62870fc829c0e022a252b0e77aff999d6ca195160334cdccb0eb57d23fa5d830cc19b201d545aa8d63b95c9f9e1b49d9995ba07071837b283

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks