General

  • Target

    FlashPlayerV4.7.apk

  • Size

    7.9MB

  • Sample

    211201-dqsncahgdp

  • MD5

    576729c3a72dbc45951e6aa808fc7536

  • SHA1

    6f527d1b531389fb5221b8469969e2f8541e32cb

  • SHA256

    f82ce4168051c18028bd94ae29eafb201928f9fa90856d8ed12f36acb891d439

  • SHA512

    f8b58668f52cf3a6e64ba765d328f127297f708cedd93a14869fa1eddec98433f0a33e071b073798c4253ccce6613e993f77e354bbc9ec0f081bf53afb343134

Malware Config

Targets

    • Target

      FlashPlayerV4.7.apk

    • Size

      7.9MB

    • MD5

      576729c3a72dbc45951e6aa808fc7536

    • SHA1

      6f527d1b531389fb5221b8469969e2f8541e32cb

    • SHA256

      f82ce4168051c18028bd94ae29eafb201928f9fa90856d8ed12f36acb891d439

    • SHA512

      f8b58668f52cf3a6e64ba765d328f127297f708cedd93a14869fa1eddec98433f0a33e071b073798c4253ccce6613e993f77e354bbc9ec0f081bf53afb343134

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks