General

  • Target

    f0a3690fe48a9e25894c30784882cb5b

  • Size

    6.9MB

  • Sample

    220112-afbejaadem

  • MD5

    f0a3690fe48a9e25894c30784882cb5b

  • SHA1

    35f629e6f804c547067f1eda9bb0c50efce0c4e6

  • SHA256

    6247d0dc4f7a148ad7487371afad0ee51fbfe6e8f046d59125b50d480f92d0e3

  • SHA512

    56aad4488d17b7c31623fc4b49227c813c17de0545d727fc973c45a5e498c187b64bcd6964f9a37f207c3c548f110efd4de621cecd05a73706f542d715d60e93

Malware Config

Targets

    • Target

      f0a3690fe48a9e25894c30784882cb5b

    • Size

      6.9MB

    • MD5

      f0a3690fe48a9e25894c30784882cb5b

    • SHA1

      35f629e6f804c547067f1eda9bb0c50efce0c4e6

    • SHA256

      6247d0dc4f7a148ad7487371afad0ee51fbfe6e8f046d59125b50d480f92d0e3

    • SHA512

      56aad4488d17b7c31623fc4b49227c813c17de0545d727fc973c45a5e498c187b64bcd6964f9a37f207c3c548f110efd4de621cecd05a73706f542d715d60e93

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks