General

  • Target

    731902e361e100b7f10e06c87200e06bebcb2bb3bee32d2a155c36120ea4cba2

  • Size

    1.6MB

  • Sample

    220125-kamwgscafn

  • MD5

    67fb423577c01a0739b7a0d43951ef79

  • SHA1

    c328c6e3b11bdce2ba682ccecf594a7b88b8d130

  • SHA256

    731902e361e100b7f10e06c87200e06bebcb2bb3bee32d2a155c36120ea4cba2

  • SHA512

    1dbcb4c571a316e738e7464335413ed340aa78d21d460257012a86434e831a43bb71b5da442d0bc1889d5faa4d43b490dfff97669446618aedc3751a9af544ea

Malware Config

Extracted

Family

hydra

C2

http://fullvehdvideoizlemeayarlari4545.site

Targets

    • Target

      731902e361e100b7f10e06c87200e06bebcb2bb3bee32d2a155c36120ea4cba2

    • Size

      1.6MB

    • MD5

      67fb423577c01a0739b7a0d43951ef79

    • SHA1

      c328c6e3b11bdce2ba682ccecf594a7b88b8d130

    • SHA256

      731902e361e100b7f10e06c87200e06bebcb2bb3bee32d2a155c36120ea4cba2

    • SHA512

      1dbcb4c571a316e738e7464335413ed340aa78d21d460257012a86434e831a43bb71b5da442d0bc1889d5faa4d43b490dfff97669446618aedc3751a9af544ea

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks