General

  • Target

    bawag.apk

  • Size

    7.1MB

  • Sample

    220208-kwky1sfaaj

  • MD5

    fe213493a9e0ea129cb1fc2477e6fd92

  • SHA1

    4952a1729ad0801823e3c71280c9f1d3429d2b17

  • SHA256

    f84e5ccc0c78f97e27d486f22c28f7f3c8f48f7455f51ce4c89940297057fd26

  • SHA512

    a950b627ade1410a313fe3cfd4fd6d8d0366cdca93597182a11055083dbe4070f13363c543abfdfb1f27935f8c2720c7abd5d74881b431b92a80064a2663fbed

Malware Config

Targets

    • Target

      bawag.apk

    • Size

      7.1MB

    • MD5

      fe213493a9e0ea129cb1fc2477e6fd92

    • SHA1

      4952a1729ad0801823e3c71280c9f1d3429d2b17

    • SHA256

      f84e5ccc0c78f97e27d486f22c28f7f3c8f48f7455f51ce4c89940297057fd26

    • SHA512

      a950b627ade1410a313fe3cfd4fd6d8d0366cdca93597182a11055083dbe4070f13363c543abfdfb1f27935f8c2720c7abd5d74881b431b92a80064a2663fbed

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks