Resubmissions

20-01-2022 19:25

220120-x48q9sbce3 10

20-01-2022 19:18

220120-x1d3gsbcbn 10

General

  • Target

    FlashPlayerV3.1(1).apk

  • Size

    7.0MB

  • Sample

    220120-x1d3gsbcbn

  • MD5

    f69b7ddc302f84020975facf50daf491

  • SHA1

    e20a189c6b1bf590dfbb959b400683c297da6434

  • SHA256

    e773c45b680de89a74a82793576c736c7a4c7ac7f303567bc0f71cd4e0b50131

  • SHA512

    451e05ed161df87b2c5e1ecd18d4b2d2498c5899dc2c442d1e33f37072ee15dfb16f9c87f2d0141e866f69c71bcc1632174cf1da8507ad9aede7d5e71f739545

Malware Config

Targets

    • Target

      FlashPlayerV3.1(1).apk

    • Size

      7.0MB

    • MD5

      f69b7ddc302f84020975facf50daf491

    • SHA1

      e20a189c6b1bf590dfbb959b400683c297da6434

    • SHA256

      e773c45b680de89a74a82793576c736c7a4c7ac7f303567bc0f71cd4e0b50131

    • SHA512

      451e05ed161df87b2c5e1ecd18d4b2d2498c5899dc2c442d1e33f37072ee15dfb16f9c87f2d0141e866f69c71bcc1632174cf1da8507ad9aede7d5e71f739545

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks