General

  • Target

    28054_Video_Oynatıcı.apk

  • Size

    2.6MB

  • Sample

    220106-q6ywhsbffk

  • MD5

    1b922faa991ecc4989a577f3632fb354

  • SHA1

    a2facadad960ba106535d412c119aac03d89083f

  • SHA256

    069bddcaf8203ae0aa728e7745dd80203f688f446c6789b31c8f00ebcbfbe9c9

  • SHA512

    d3c5204f815eadf5606db38b12ec6c50dad6494ce93f30639f8cf16858f8be0b5054fd0a7fcfaedd002406c50bbbf31baa9e1f392e9a818598d6b4c77e0d6461

Malware Config

Extracted

Family

hydra

C2

http://viveklees437.website

Targets

    • Target

      28054_Video_Oynatıcı.apk

    • Size

      2.6MB

    • MD5

      1b922faa991ecc4989a577f3632fb354

    • SHA1

      a2facadad960ba106535d412c119aac03d89083f

    • SHA256

      069bddcaf8203ae0aa728e7745dd80203f688f446c6789b31c8f00ebcbfbe9c9

    • SHA512

      d3c5204f815eadf5606db38b12ec6c50dad6494ce93f30639f8cf16858f8be0b5054fd0a7fcfaedd002406c50bbbf31baa9e1f392e9a818598d6b4c77e0d6461

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks