General

  • Target

    90621_Video_Oynatıcı.apk

  • Size

    2.5MB

  • Sample

    220108-1xsm9adcd4

  • MD5

    4403836ac9af55e0dc0300cc58a3355c

  • SHA1

    e8a82a7a115a5805ff6a578bf7b1c2e84a426787

  • SHA256

    1bb3ac10b2cdd0a1edb3c730f766cb48e8173dbccea04a9afe44f3aef1060682

  • SHA512

    399593d7c2b9aec2f34aa803527e90bcb126d62cf5a6a7ddd5c6367dea4be683d287841f92eaa4dfae2a836300da688005535c3a92b660731db1a8630f4e0d66

Malware Config

Extracted

Family

hydra

C2

http://mekhimccabe5573.website

Targets

    • Target

      90621_Video_Oynatıcı.apk

    • Size

      2.5MB

    • MD5

      4403836ac9af55e0dc0300cc58a3355c

    • SHA1

      e8a82a7a115a5805ff6a578bf7b1c2e84a426787

    • SHA256

      1bb3ac10b2cdd0a1edb3c730f766cb48e8173dbccea04a9afe44f3aef1060682

    • SHA512

      399593d7c2b9aec2f34aa803527e90bcb126d62cf5a6a7ddd5c6367dea4be683d287841f92eaa4dfae2a836300da688005535c3a92b660731db1a8630f4e0d66

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks