General

  • Target

    19354_Video_Oynatıcı.apk

  • Size

    4.5MB

  • Sample

    211212-tcsdesdfep

  • MD5

    2e163c1515b7fd0c256cad114136317f

  • SHA1

    ee108de379a86d9573a2e474e63d96a1abc83e01

  • SHA256

    c2ef244e7a1980880aeb212672705e877851b9cc054e023015dd748c8e69ab38

  • SHA512

    c644b7dc39d61538296d21218dc464469015664cd0937af77ae5319ac0e8fc9b80e509bd946bc2d5dacb2b7d21b5ff1bc3e3db194039d695e49b57db8f51815a

Malware Config

Extracted

Family

hydra

C2

http://adellebruce437547.website

Targets

    • Target

      19354_Video_Oynatıcı.apk

    • Size

      4.5MB

    • MD5

      2e163c1515b7fd0c256cad114136317f

    • SHA1

      ee108de379a86d9573a2e474e63d96a1abc83e01

    • SHA256

      c2ef244e7a1980880aeb212672705e877851b9cc054e023015dd748c8e69ab38

    • SHA512

      c644b7dc39d61538296d21218dc464469015664cd0937af77ae5319ac0e8fc9b80e509bd946bc2d5dacb2b7d21b5ff1bc3e3db194039d695e49b57db8f51815a

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks