General

  • Target

    37209_Video_Oynatıcı.apk

  • Size

    2.5MB

  • Sample

    220106-q6y7aabffl

  • MD5

    4b3d7940c616d04f0b0ec98abba0ec52

  • SHA1

    4b6ccfb7644a02fd10cdf16398df50d368645409

  • SHA256

    ae47584cc5b96611a40bf28683e4a31741514dca3fd428639ac7814d5cc7cf16

  • SHA512

    a113cc24d27c5d44f418e61aab0dafc8d99e23ab7248b4c28b474bb2b778e9a6bb169b6b58d957f38134c7f16f26718b50e92cc139e7dc1c5a1c39d21a278526

Malware Config

Extracted

Family

hydra

C2

http://viveklees437.website

Targets

    • Target

      37209_Video_Oynatıcı.apk

    • Size

      2.5MB

    • MD5

      4b3d7940c616d04f0b0ec98abba0ec52

    • SHA1

      4b6ccfb7644a02fd10cdf16398df50d368645409

    • SHA256

      ae47584cc5b96611a40bf28683e4a31741514dca3fd428639ac7814d5cc7cf16

    • SHA512

      a113cc24d27c5d44f418e61aab0dafc8d99e23ab7248b4c28b474bb2b778e9a6bb169b6b58d957f38134c7f16f26718b50e92cc139e7dc1c5a1c39d21a278526

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks