General

  • Target

    FlashPlayerV4.1.apk

  • Size

    7.0MB

  • Sample

    220106-2k5mqacahl

  • MD5

    3fa53e0680d71e72e8e680ee77d1c38c

  • SHA1

    7d0e1043784975da7d387260a48b08aa1cc759f6

  • SHA256

    f2cc192b3fa03b637c3c407724c5bb24b84fdb0b55a73b152a3d8be30a2d2692

  • SHA512

    bcbf4b059ba9e4411ebd8da69dc2c36a6d212a7f8e8953cc81f1865fb89301f45067ad812f38ea0cd7011e7c2e7bdcf4757002b747625c2c8faf809144b83fd1

Malware Config

Targets

    • Target

      FlashPlayerV4.1.apk

    • Size

      7.0MB

    • MD5

      3fa53e0680d71e72e8e680ee77d1c38c

    • SHA1

      7d0e1043784975da7d387260a48b08aa1cc759f6

    • SHA256

      f2cc192b3fa03b637c3c407724c5bb24b84fdb0b55a73b152a3d8be30a2d2692

    • SHA512

      bcbf4b059ba9e4411ebd8da69dc2c36a6d212a7f8e8953cc81f1865fb89301f45067ad812f38ea0cd7011e7c2e7bdcf4757002b747625c2c8faf809144b83fd1

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks