General

  • Target

    bawag.apk

  • Size

    7.4MB

  • Sample

    211207-krl1hsgdhr

  • MD5

    9326a01f58049dcd9947e91c71972fba

  • SHA1

    6686eec12836e010a929df0df3ca87b3d718d348

  • SHA256

    e80cb43578f6a8b2ded95c8a2e86076f3661d60e2f18ebd1f094308e1d593c87

  • SHA512

    7e1a4a26b384b5c611c6927ff5176fa9f75a6ce7488bfd080b7ea461dad7a54a4267f18d11d826de33fb85cde609824350b41ea59b730e116424397e4d7b3a70

Malware Config

Targets

    • Target

      bawag.apk

    • Size

      7.4MB

    • MD5

      9326a01f58049dcd9947e91c71972fba

    • SHA1

      6686eec12836e010a929df0df3ca87b3d718d348

    • SHA256

      e80cb43578f6a8b2ded95c8a2e86076f3661d60e2f18ebd1f094308e1d593c87

    • SHA512

      7e1a4a26b384b5c611c6927ff5176fa9f75a6ce7488bfd080b7ea461dad7a54a4267f18d11d826de33fb85cde609824350b41ea59b730e116424397e4d7b3a70

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks