General

  • Target

    psk.apk

  • Size

    7.1MB

  • Sample

    220301-rl99gsbhaq

  • MD5

    975f5eff0e960994608742678ca70208

  • SHA1

    e311d4f346b363665c462658889ddfb73c4dd8da

  • SHA256

    64d0257352222162db7125f27e4ef16958c515326adab554d50698a1685e46ef

  • SHA512

    7a2fbbb412504f431d6fdbd1f3390ab725eb7cd5ae37afaccf604d0d329ab6cecba45c90d48ef722a680026eac13356987ba4fdf85845c2cb689f0fce8119622

Malware Config

Targets

    • Target

      psk.apk

    • Size

      7.1MB

    • MD5

      975f5eff0e960994608742678ca70208

    • SHA1

      e311d4f346b363665c462658889ddfb73c4dd8da

    • SHA256

      64d0257352222162db7125f27e4ef16958c515326adab554d50698a1685e46ef

    • SHA512

      7a2fbbb412504f431d6fdbd1f3390ab725eb7cd5ae37afaccf604d0d329ab6cecba45c90d48ef722a680026eac13356987ba4fdf85845c2cb689f0fce8119622

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks