General

  • Target

    psk.apk

  • Size

    6.9MB

  • Sample

    220126-q6esmsdgg4

  • MD5

    552a6c1803259e63e0f92a2aee1ea908

  • SHA1

    ab06fff42099e35c1ee128cda7d36db7105f6d56

  • SHA256

    184ea57eb7c01ce4de824c21a8627065ad7001dd09c849663e3ff5bbd4e554fe

  • SHA512

    48d83bfc592644db73e2e63ff04f1b564f3f97bdac687a11ebee67983d03bb0f7a33c7fa493e2d4941bd004d349095291d7c0f7bce529e4c7d8ea861cd208515

Malware Config

Targets

    • Target

      psk.apk

    • Size

      6.9MB

    • MD5

      552a6c1803259e63e0f92a2aee1ea908

    • SHA1

      ab06fff42099e35c1ee128cda7d36db7105f6d56

    • SHA256

      184ea57eb7c01ce4de824c21a8627065ad7001dd09c849663e3ff5bbd4e554fe

    • SHA512

      48d83bfc592644db73e2e63ff04f1b564f3f97bdac687a11ebee67983d03bb0f7a33c7fa493e2d4941bd004d349095291d7c0f7bce529e4c7d8ea861cd208515

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks