General

  • Target

    e1d2d505ade5058fa403ba7c1614835c

  • Size

    7.2MB

  • Sample

    211217-yw1w5aebd3

  • MD5

    e1d2d505ade5058fa403ba7c1614835c

  • SHA1

    ebf6d3c9e2a53534bc16dfc4f81a19633177204b

  • SHA256

    384e6d5fbf3f461001e0556a62326f98d723b71c8013af9f7eec3acdc1e8d23f

  • SHA512

    1b6668a4481d7752ee9eb305967630c310dc92980d0852161516e7091cc19d09416bf5a4fc142a7f7a34ec89708852529cdedd26064733f88a4d7b06d2223526

Malware Config

Targets

    • Target

      e1d2d505ade5058fa403ba7c1614835c

    • Size

      7.2MB

    • MD5

      e1d2d505ade5058fa403ba7c1614835c

    • SHA1

      ebf6d3c9e2a53534bc16dfc4f81a19633177204b

    • SHA256

      384e6d5fbf3f461001e0556a62326f98d723b71c8013af9f7eec3acdc1e8d23f

    • SHA512

      1b6668a4481d7752ee9eb305967630c310dc92980d0852161516e7091cc19d09416bf5a4fc142a7f7a34ec89708852529cdedd26064733f88a4d7b06d2223526

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks