General

  • Target

    b6e855cf003ac9c1ac0995f58d6d9fd7

  • Size

    5.3MB

  • Sample

    220214-wvyn9sbhdl

  • MD5

    b6e855cf003ac9c1ac0995f58d6d9fd7

  • SHA1

    ef819498317db4d9d84423d952e8d73b17589517

  • SHA256

    75ca5adbf517aa4c5b872405043ee1eced9d64e7aec3d06107738861fbd646b2

  • SHA512

    0298093112049b6520c8c873b0af54dbd25af9e19888cdfe889c383c81e404ce1cb5c5a2daff53583ba95398c60cf92593bde4315ab33d0806ee64387b4a4e7f

Malware Config

Targets

    • Target

      b6e855cf003ac9c1ac0995f58d6d9fd7

    • Size

      5.3MB

    • MD5

      b6e855cf003ac9c1ac0995f58d6d9fd7

    • SHA1

      ef819498317db4d9d84423d952e8d73b17589517

    • SHA256

      75ca5adbf517aa4c5b872405043ee1eced9d64e7aec3d06107738861fbd646b2

    • SHA512

      0298093112049b6520c8c873b0af54dbd25af9e19888cdfe889c383c81e404ce1cb5c5a2daff53583ba95398c60cf92593bde4315ab33d0806ee64387b4a4e7f

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks