General

  • Target

    69258_Video_Oynatıcı.apk

  • Size

    2.3MB

  • Sample

    211221-jqd3vadcen

  • MD5

    3ccebdec07c15dfd81412818b05a57ec

  • SHA1

    813ffb816b1d50475d3b5d5045d4c4c637fcb259

  • SHA256

    91126eea4f088df8a38667eff9f0fd8b6d49a58b919e8cfd242612a44d702b40

  • SHA512

    7d8c01f90504523d2461e04803e5a411393f12e740e81994c0d03761cf1cf4d8c65248500f522206035db38949b4b1cb58696739223a0964093dea246eab65cf

Malware Config

Targets

    • Target

      69258_Video_Oynatıcı.apk

    • Size

      2.3MB

    • MD5

      3ccebdec07c15dfd81412818b05a57ec

    • SHA1

      813ffb816b1d50475d3b5d5045d4c4c637fcb259

    • SHA256

      91126eea4f088df8a38667eff9f0fd8b6d49a58b919e8cfd242612a44d702b40

    • SHA512

      7d8c01f90504523d2461e04803e5a411393f12e740e81994c0d03761cf1cf4d8c65248500f522206035db38949b4b1cb58696739223a0964093dea246eab65cf

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks