General

  • Target

    video_oynat.apk

  • Size

    2.5MB

  • Sample

    220114-1ynqpaagh6

  • MD5

    8b71a768b2cf5934ddf127524391af18

  • SHA1

    398e494bb0aac07b4a2ff6e2e1818aad5aa352a1

  • SHA256

    ae01b27bae902fe1e810881fd76879b4cf947da656075aa0909761821fa71168

  • SHA512

    9ae037f0ef8520f888a99757c2dc8ddd6d407c70db33a8d49abb0fe69f4c7f594339f31ab40397c2aba444f01b5e27cd102aa42f1af64701cc1a4abb526596af

Malware Config

Extracted

Family

hydra

C2

http://woodyrobinson346.website

Targets

    • Target

      video_oynat.apk

    • Size

      2.5MB

    • MD5

      8b71a768b2cf5934ddf127524391af18

    • SHA1

      398e494bb0aac07b4a2ff6e2e1818aad5aa352a1

    • SHA256

      ae01b27bae902fe1e810881fd76879b4cf947da656075aa0909761821fa71168

    • SHA512

      9ae037f0ef8520f888a99757c2dc8ddd6d407c70db33a8d49abb0fe69f4c7f594339f31ab40397c2aba444f01b5e27cd102aa42f1af64701cc1a4abb526596af

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks