General

  • Target

    psk.apk

  • Size

    6.2MB

  • Sample

    220216-jx94vsbdg6

  • MD5

    24f7fd773edcd9fd9440414921a13583

  • SHA1

    f1e9f0c83ee704d66ae6b263f96c918d82ea5a6e

  • SHA256

    5ccc7291adb2a897dd3d0d273fb79bbfa98877ee8553b919813672f8cb02f893

  • SHA512

    b197fc66f077e1b2c3d192cf5891f7daa2f20e5846cbecd8598b3fdf0b82814b18dcbf0d8baf5606a7d0f54bde2169be15e5c36a0b18f6a258d3b6a5cec0f7b7

Malware Config

Targets

    • Target

      psk.apk

    • Size

      6.2MB

    • MD5

      24f7fd773edcd9fd9440414921a13583

    • SHA1

      f1e9f0c83ee704d66ae6b263f96c918d82ea5a6e

    • SHA256

      5ccc7291adb2a897dd3d0d273fb79bbfa98877ee8553b919813672f8cb02f893

    • SHA512

      b197fc66f077e1b2c3d192cf5891f7daa2f20e5846cbecd8598b3fdf0b82814b18dcbf0d8baf5606a7d0f54bde2169be15e5c36a0b18f6a258d3b6a5cec0f7b7

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks