General

  • Target

    bawag.apk

  • Size

    8.2MB

  • Sample

    211126-rf5rtagae5

  • MD5

    2cc9b0f73c834830b99ef2a9e0c3da27

  • SHA1

    5d0b20afb0f45c5acbdcfee49b41f83cee3fca83

  • SHA256

    d5a63c4ace387cff8d641ad9aeedf9e406684b0f3bdcfc79e97de80eef177bee

  • SHA512

    6d7eb370926eb81a7d63c43c3572028f3e7e66c86982c5272a340b00f9c29800892d0ffa4f5d27eb61e6df81bf56ca1b2dc8fece28594bbca1c05739eab004ab

Malware Config

Targets

    • Target

      bawag.apk

    • Size

      8.2MB

    • MD5

      2cc9b0f73c834830b99ef2a9e0c3da27

    • SHA1

      5d0b20afb0f45c5acbdcfee49b41f83cee3fca83

    • SHA256

      d5a63c4ace387cff8d641ad9aeedf9e406684b0f3bdcfc79e97de80eef177bee

    • SHA512

      6d7eb370926eb81a7d63c43c3572028f3e7e66c86982c5272a340b00f9c29800892d0ffa4f5d27eb61e6df81bf56ca1b2dc8fece28594bbca1c05739eab004ab

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks