Resubmissions

20-01-2022 19:28

220120-x6zalsbcej 10

12-01-2022 15:08

220112-sh512adagm 7

General

  • Target

    9fa6f67e940c78a0ecec93f8b86b1637

  • Size

    6.9MB

  • Sample

    220120-x6zalsbcej

  • MD5

    9fa6f67e940c78a0ecec93f8b86b1637

  • SHA1

    00ce3716a6c43128e34ce3159c727b625b638117

  • SHA256

    4367e93b85743eac8383eb686caa6891b86d3846f7d729a955927c3dd7229cd0

  • SHA512

    4fca111479be69865dad9a9d1379d130d4fafceb2d6747563ec7c538b962beafdca2ab57f048865d2a09b188c4549083e5c03972c1ba27d4c23edccb0dc527cb

Malware Config

Targets

    • Target

      9fa6f67e940c78a0ecec93f8b86b1637

    • Size

      6.9MB

    • MD5

      9fa6f67e940c78a0ecec93f8b86b1637

    • SHA1

      00ce3716a6c43128e34ce3159c727b625b638117

    • SHA256

      4367e93b85743eac8383eb686caa6891b86d3846f7d729a955927c3dd7229cd0

    • SHA512

      4fca111479be69865dad9a9d1379d130d4fafceb2d6747563ec7c538b962beafdca2ab57f048865d2a09b188c4549083e5c03972c1ba27d4c23edccb0dc527cb

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks