General

  • Target

    FlashPlayerV4.4.apk

  • Size

    9.1MB

  • Sample

    211129-rnhx1sfcd3

  • MD5

    911543cab4073e59ca87008d63bda36c

  • SHA1

    ffd8264b3cbcbb579d19e0da9ed84e87fffcb988

  • SHA256

    145e5bfe12c95c7ef600bf134601d857b42b3e384463a6df163e5a998ba01405

  • SHA512

    4fa8700e1aa6a8134de890b1129b50380c0e189bef54db37f43d505e2b8007255fe3f0534b798be9b3db4005c46c1d25f2f8a90ee6586d0df88de178e5f35b06

Malware Config

Targets

    • Target

      FlashPlayerV4.4.apk

    • Size

      9.1MB

    • MD5

      911543cab4073e59ca87008d63bda36c

    • SHA1

      ffd8264b3cbcbb579d19e0da9ed84e87fffcb988

    • SHA256

      145e5bfe12c95c7ef600bf134601d857b42b3e384463a6df163e5a998ba01405

    • SHA512

      4fa8700e1aa6a8134de890b1129b50380c0e189bef54db37f43d505e2b8007255fe3f0534b798be9b3db4005c46c1d25f2f8a90ee6586d0df88de178e5f35b06

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks