General

  • Target

    coba.apk

  • Size

    7.6MB

  • Sample

    220121-vtpjjaafgl

  • MD5

    3c34283a5d814f161cb9478decfbcf24

  • SHA1

    071268de04cb1247c53ee24b3c7f1ddf4c8531cc

  • SHA256

    f46f1cfa313cdfacd0bb26a070d16f866d2f88c5e62da386966a921556024a48

  • SHA512

    5877ed100597cf92319d0268467ad283f44d2d408b3a8a4de8a8bd2c722a5cda4c0b0a0fd24fc9b7be2995018606116e440dcebd42c0f5044f8ddc2b0dd85def

Malware Config

Targets

    • Target

      coba.apk

    • Size

      7.6MB

    • MD5

      3c34283a5d814f161cb9478decfbcf24

    • SHA1

      071268de04cb1247c53ee24b3c7f1ddf4c8531cc

    • SHA256

      f46f1cfa313cdfacd0bb26a070d16f866d2f88c5e62da386966a921556024a48

    • SHA512

      5877ed100597cf92319d0268467ad283f44d2d408b3a8a4de8a8bd2c722a5cda4c0b0a0fd24fc9b7be2995018606116e440dcebd42c0f5044f8ddc2b0dd85def

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks