General

  • Target

    60427_Video_Oynatıcı.apk

  • Size

    2.5MB

  • Sample

    220106-q6y7aabce5

  • MD5

    bb2928ec10c83a71a4a0e17ba121eaaf

  • SHA1

    70b1c16426f64777ef4106c77bf4d26ad1e2a7a7

  • SHA256

    ce6a30acd4452bb2113ae491484c9f616ed86112d8b19e121692655f37319dac

  • SHA512

    2e166eb9ac3f77d959f7d662d3f9c09b4814fc92b936473144d02d8cb0613a56ec5d0b6fbb6c925769e0535f78cc3c22573387f0b8eabce6f0af644f614a9969

Malware Config

Extracted

Family

hydra

C2

http://viveklees437.website

Targets

    • Target

      60427_Video_Oynatıcı.apk

    • Size

      2.5MB

    • MD5

      bb2928ec10c83a71a4a0e17ba121eaaf

    • SHA1

      70b1c16426f64777ef4106c77bf4d26ad1e2a7a7

    • SHA256

      ce6a30acd4452bb2113ae491484c9f616ed86112d8b19e121692655f37319dac

    • SHA512

      2e166eb9ac3f77d959f7d662d3f9c09b4814fc92b936473144d02d8cb0613a56ec5d0b6fbb6c925769e0535f78cc3c22573387f0b8eabce6f0af644f614a9969

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks