General

  • Target

    b9dd9650cb0591a0c15e44da102dc65449aca415822c102c26fb7a0321803374.apk

  • Size

    6.0MB

  • Sample

    220215-pbbl3aefa9

  • MD5

    f9bc80b984b9ca2012dab7b557d25f25

  • SHA1

    e13fdc7d91e9b890cfe5940a7245344a01a2179e

  • SHA256

    b9dd9650cb0591a0c15e44da102dc65449aca415822c102c26fb7a0321803374

  • SHA512

    5090e552ce2efb5bbae29a05b00d5ff76bf61f5484e327df686f49ac99d23955bc6d496ebe23326c218e6cccee745e970a899596f60c90c57f1a6f2e2323cd0a

Malware Config

Targets

    • Target

      b9dd9650cb0591a0c15e44da102dc65449aca415822c102c26fb7a0321803374.apk

    • Size

      6.0MB

    • MD5

      f9bc80b984b9ca2012dab7b557d25f25

    • SHA1

      e13fdc7d91e9b890cfe5940a7245344a01a2179e

    • SHA256

      b9dd9650cb0591a0c15e44da102dc65449aca415822c102c26fb7a0321803374

    • SHA512

      5090e552ce2efb5bbae29a05b00d5ff76bf61f5484e327df686f49ac99d23955bc6d496ebe23326c218e6cccee745e970a899596f60c90c57f1a6f2e2323cd0a

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks