General

  • Target

    650e812437430a8f437eb1ec15daa6667d114c3c98a4ca22a1afef1ad4f7a13c

  • Size

    6.9MB

  • Sample

    220110-q6wfdsech3

  • MD5

    ea12aba15c8196d6d9862a3e36e3afae

  • SHA1

    fad296acd12a25e2bdf80c1c9e82a592a8bd06fd

  • SHA256

    650e812437430a8f437eb1ec15daa6667d114c3c98a4ca22a1afef1ad4f7a13c

  • SHA512

    9c95e4d0387520a4ce1961cbf60ff5eb56543a3b79bf53b415c83fa7f5c96beb7d3dfedcd730740f0996cd1d4d5197d0dcca2098a857bf073fa775543fd94d36

Malware Config

Targets

    • Target

      650e812437430a8f437eb1ec15daa6667d114c3c98a4ca22a1afef1ad4f7a13c

    • Size

      6.9MB

    • MD5

      ea12aba15c8196d6d9862a3e36e3afae

    • SHA1

      fad296acd12a25e2bdf80c1c9e82a592a8bd06fd

    • SHA256

      650e812437430a8f437eb1ec15daa6667d114c3c98a4ca22a1afef1ad4f7a13c

    • SHA512

      9c95e4d0387520a4ce1961cbf60ff5eb56543a3b79bf53b415c83fa7f5c96beb7d3dfedcd730740f0996cd1d4d5197d0dcca2098a857bf073fa775543fd94d36

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks