General

  • Target

    psk.apk

  • Size

    6.9MB

  • Sample

    220126-j96bfabbg2

  • MD5

    8186e5cd533ee32e030a7e8187ad3a6f

  • SHA1

    f4c9051a32d5b3f0fa329ef2edc44b1b069132ac

  • SHA256

    5e19b1f8567f5d6484c95b0a38420b8e5ba2c378bfd330fd69e7ff9061da2255

  • SHA512

    cebbb470245b074bc005eecbdf7acdd2698663852131e928e83b5fd8bc981ec4f84fbd6c5b2a9ac0a6c769acf3536d6f8126fd7d34926ddcd852dc552f45cc9c

Malware Config

Targets

    • Target

      psk.apk

    • Size

      6.9MB

    • MD5

      8186e5cd533ee32e030a7e8187ad3a6f

    • SHA1

      f4c9051a32d5b3f0fa329ef2edc44b1b069132ac

    • SHA256

      5e19b1f8567f5d6484c95b0a38420b8e5ba2c378bfd330fd69e7ff9061da2255

    • SHA512

      cebbb470245b074bc005eecbdf7acdd2698663852131e928e83b5fd8bc981ec4f84fbd6c5b2a9ac0a6c769acf3536d6f8126fd7d34926ddcd852dc552f45cc9c

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks