General

  • Target

    59126_Video_Oynatıcı.apk

  • Size

    2.5MB

  • Sample

    220106-q6y7aabffm

  • MD5

    0bb89bd490d74428e30545a7c60e595c

  • SHA1

    3183e82c86cfcdf77404c69ad44e689329310138

  • SHA256

    49d69ac875a07acf7aa353a52d5ff75fac3e39401ab051f1f2804ecb2c336a0a

  • SHA512

    d701b39fa209cb8ae33e7b3bf3ca1636a40f2dac855bc5244b9ccb6ba4b07e10200cc2e314a06cf9a3b5db7fdd93427dbcb6a500d4d6ff4baf902ec357819059

Malware Config

Extracted

Family

hydra

C2

http://viveklees437.website

Targets

    • Target

      59126_Video_Oynatıcı.apk

    • Size

      2.5MB

    • MD5

      0bb89bd490d74428e30545a7c60e595c

    • SHA1

      3183e82c86cfcdf77404c69ad44e689329310138

    • SHA256

      49d69ac875a07acf7aa353a52d5ff75fac3e39401ab051f1f2804ecb2c336a0a

    • SHA512

      d701b39fa209cb8ae33e7b3bf3ca1636a40f2dac855bc5244b9ccb6ba4b07e10200cc2e314a06cf9a3b5db7fdd93427dbcb6a500d4d6ff4baf902ec357819059

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks