General

  • Target

    psk.apk

  • Size

    6.9MB

  • Sample

    220126-kywtasbea9

  • MD5

    0cf1b5b0244c4bb324412bce80d33352

  • SHA1

    9b5c773c3a13014d620a38f9da146459da30b54b

  • SHA256

    d5a64f4885dffab0a12c161d7eff5722294eda8111242ddfadee907f6a609e4d

  • SHA512

    4fd37b310176b24c8faccc7e0b8cc891e3c397127592548ac7c2f55cbf9216db58d3e0f5dc9b4fcefa74c8026b3764588bf305916edcf21425b21b2bd9c7feb2

Malware Config

Targets

    • Target

      psk.apk

    • Size

      6.9MB

    • MD5

      0cf1b5b0244c4bb324412bce80d33352

    • SHA1

      9b5c773c3a13014d620a38f9da146459da30b54b

    • SHA256

      d5a64f4885dffab0a12c161d7eff5722294eda8111242ddfadee907f6a609e4d

    • SHA512

      4fd37b310176b24c8faccc7e0b8cc891e3c397127592548ac7c2f55cbf9216db58d3e0f5dc9b4fcefa74c8026b3764588bf305916edcf21425b21b2bd9c7feb2

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks