General

  • Target

    f8d6d8bc3a653b709388788c38f1fdccb90cca3d0614bc0b25fbe00f6149612e.apk

  • Size

    6.9MB

  • Sample

    211216-lpcjqscebr

  • MD5

    16c009e5049f1bf213e9e2773634bd1f

  • SHA1

    7b04fae79b75e7d10bec84b3df20fac321d19bf3

  • SHA256

    f8d6d8bc3a653b709388788c38f1fdccb90cca3d0614bc0b25fbe00f6149612e

  • SHA512

    955589f566090512361070bc2bd80140aba4db77e9fc441e9f11afe7b22b79a2c4ebc40c8e57aae7dd8b3919416e22c54a39a7c059e4a2dae735d299b86b4550

Malware Config

Targets

    • Target

      f8d6d8bc3a653b709388788c38f1fdccb90cca3d0614bc0b25fbe00f6149612e.apk

    • Size

      6.9MB

    • MD5

      16c009e5049f1bf213e9e2773634bd1f

    • SHA1

      7b04fae79b75e7d10bec84b3df20fac321d19bf3

    • SHA256

      f8d6d8bc3a653b709388788c38f1fdccb90cca3d0614bc0b25fbe00f6149612e

    • SHA512

      955589f566090512361070bc2bd80140aba4db77e9fc441e9f11afe7b22b79a2c4ebc40c8e57aae7dd8b3919416e22c54a39a7c059e4a2dae735d299b86b4550

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks