General

  • Target

    coba.apk

  • Size

    7.6MB

  • Sample

    220126-j7arrabbe8

  • MD5

    f91dc4a9a1ba0169d65da1f8b7355ff3

  • SHA1

    ea35a9f17cb600cd3405219193aa63fd69905414

  • SHA256

    d786550044be632e5472f7e82907e3ab59a0702501dc815c956412c2fb20a13e

  • SHA512

    940471a43ca04617d8d0e620bcfc645a5b3db50cb0110175c4ac342c85e2c78f3f696372616bf51f1f121bbc265eb630830b572aa65264fb71084bd860522ca1

Malware Config

Targets

    • Target

      coba.apk

    • Size

      7.6MB

    • MD5

      f91dc4a9a1ba0169d65da1f8b7355ff3

    • SHA1

      ea35a9f17cb600cd3405219193aa63fd69905414

    • SHA256

      d786550044be632e5472f7e82907e3ab59a0702501dc815c956412c2fb20a13e

    • SHA512

      940471a43ca04617d8d0e620bcfc645a5b3db50cb0110175c4ac342c85e2c78f3f696372616bf51f1f121bbc265eb630830b572aa65264fb71084bd860522ca1

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks