General

  • Target

    20841_Video_Oynatıcı.apk

  • Size

    2.4MB

  • Sample

    220105-qsdcnaadb5

  • MD5

    b11e72c94d810958df65d8716d853bc3

  • SHA1

    606a5eaf439586fc316a3befc85431091bfa786e

  • SHA256

    9ec93f30a4d4c404687abd67f4aeb19d2f50b16c7662e41aba8f86a5407ba14d

  • SHA512

    c18853c87af0198a0d19d097e1f83e0044d32b3d676a23dd0cd132499d098a951d31777153e6c6e9f9710b3fc28e74129173fc90b6c7ab2711a34a84ff5b98c5

Malware Config

Extracted

Family

hydra

C2

http://minaherrera5347.website

Targets

    • Target

      20841_Video_Oynatıcı.apk

    • Size

      2.4MB

    • MD5

      b11e72c94d810958df65d8716d853bc3

    • SHA1

      606a5eaf439586fc316a3befc85431091bfa786e

    • SHA256

      9ec93f30a4d4c404687abd67f4aeb19d2f50b16c7662e41aba8f86a5407ba14d

    • SHA512

      c18853c87af0198a0d19d097e1f83e0044d32b3d676a23dd0cd132499d098a951d31777153e6c6e9f9710b3fc28e74129173fc90b6c7ab2711a34a84ff5b98c5

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks