General

  • Target

    coba.apk

  • Size

    3.9MB

  • Sample

    220329-lw7nfsdae7

  • MD5

    cc75c64449276f37f147f7c8f5589e2c

  • SHA1

    d9e3d4a4f84ebb8c544e37ad470ccbf51f358007

  • SHA256

    5d6268d44f132574165ca78264744754186028c289fa37afeaf510fd0a0047f0

  • SHA512

    a2a209f7923d8bde635202e1b0c7e5dca91a18d8a6b2a53f0ea573150065c1a64c0bbfd65025bbe5e68bcc16b211ed8f54fad2105a2a462d7bcab619e9d377c0

Malware Config

Targets

    • Target

      coba.apk

    • Size

      3.9MB

    • MD5

      cc75c64449276f37f147f7c8f5589e2c

    • SHA1

      d9e3d4a4f84ebb8c544e37ad470ccbf51f358007

    • SHA256

      5d6268d44f132574165ca78264744754186028c289fa37afeaf510fd0a0047f0

    • SHA512

      a2a209f7923d8bde635202e1b0c7e5dca91a18d8a6b2a53f0ea573150065c1a64c0bbfd65025bbe5e68bcc16b211ed8f54fad2105a2a462d7bcab619e9d377c0

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks