General

  • Target

    8ac2f7d8800e976d63c53aa48e83dcb06b0945ea33da1ba5aa4e0925ba39a3c3.apk

  • Size

    3.3MB

  • Sample

    220121-n69xnshcbp

  • MD5

    d5be67c5db0f576f4a49c80a7bf8d44b

  • SHA1

    d6a31d3318aecddfb044c1c615b61ae4a0221327

  • SHA256

    8ac2f7d8800e976d63c53aa48e83dcb06b0945ea33da1ba5aa4e0925ba39a3c3

  • SHA512

    79167f3eaa361ac5969988cb308ac73082249375d91688f8ea13abd739922f96178bbdc829c0d5f4df8e2e7d4d27ffae9ee65fb1090bf5b3ff7a3fd27b15ab66

Malware Config

Targets

    • Target

      8ac2f7d8800e976d63c53aa48e83dcb06b0945ea33da1ba5aa4e0925ba39a3c3.apk

    • Size

      3.3MB

    • MD5

      d5be67c5db0f576f4a49c80a7bf8d44b

    • SHA1

      d6a31d3318aecddfb044c1c615b61ae4a0221327

    • SHA256

      8ac2f7d8800e976d63c53aa48e83dcb06b0945ea33da1ba5aa4e0925ba39a3c3

    • SHA512

      79167f3eaa361ac5969988cb308ac73082249375d91688f8ea13abd739922f96178bbdc829c0d5f4df8e2e7d4d27ffae9ee65fb1090bf5b3ff7a3fd27b15ab66

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks