Resubmissions

06-01-2022 17:41

220106-v9j9rabdh6 10

29-12-2021 14:20

211229-rnk3dadecp 7

General

  • Target

    FlashPlayerV3.1(1).apk

  • Size

    7.0MB

  • Sample

    220106-v9j9rabdh6

  • MD5

    f69b7ddc302f84020975facf50daf491

  • SHA1

    e20a189c6b1bf590dfbb959b400683c297da6434

  • SHA256

    e773c45b680de89a74a82793576c736c7a4c7ac7f303567bc0f71cd4e0b50131

  • SHA512

    451e05ed161df87b2c5e1ecd18d4b2d2498c5899dc2c442d1e33f37072ee15dfb16f9c87f2d0141e866f69c71bcc1632174cf1da8507ad9aede7d5e71f739545

Malware Config

Targets

    • Target

      FlashPlayerV3.1(1).apk

    • Size

      7.0MB

    • MD5

      f69b7ddc302f84020975facf50daf491

    • SHA1

      e20a189c6b1bf590dfbb959b400683c297da6434

    • SHA256

      e773c45b680de89a74a82793576c736c7a4c7ac7f303567bc0f71cd4e0b50131

    • SHA512

      451e05ed161df87b2c5e1ecd18d4b2d2498c5899dc2c442d1e33f37072ee15dfb16f9c87f2d0141e866f69c71bcc1632174cf1da8507ad9aede7d5e71f739545

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks