General

  • Target

    E909B4ADCEF7B43FE8A1A8DCDBDF1E59F9A9BE01954FD8CD2D8DA27BADD18E35.apk

  • Size

    4.0MB

  • Sample

    220319-saf2yaccc9

  • MD5

    a61a768c681d326bc19762cdeaacd375

  • SHA1

    1e7a51456d60d6b53aeae656aaf0bc1eb68fd194

  • SHA256

    e909b4adcef7b43fe8a1a8dcdbdf1e59f9a9be01954fd8cd2d8da27badd18e35

  • SHA512

    d520f762c5eec0f47c00bef78156ba3809ea8d84a91729162848ed2480fe290a8a9fd6c0ac939dede5f9746bb460101f724f311a50b7c634ce3bf5067cced365

Malware Config

Targets

    • Target

      E909B4ADCEF7B43FE8A1A8DCDBDF1E59F9A9BE01954FD8CD2D8DA27BADD18E35.apk

    • Size

      4.0MB

    • MD5

      a61a768c681d326bc19762cdeaacd375

    • SHA1

      1e7a51456d60d6b53aeae656aaf0bc1eb68fd194

    • SHA256

      e909b4adcef7b43fe8a1a8dcdbdf1e59f9a9be01954fd8cd2d8da27badd18e35

    • SHA512

      d520f762c5eec0f47c00bef78156ba3809ea8d84a91729162848ed2480fe290a8a9fd6c0ac939dede5f9746bb460101f724f311a50b7c634ce3bf5067cced365

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks