General

  • Target

    bawag.apk

  • Size

    3.4MB

  • Sample

    220331-pql2cafhhm

  • MD5

    71e293f29e636112e0a00ebac8cf3eb8

  • SHA1

    c78b484b536d03a71f37c573f1ce5290507ce330

  • SHA256

    ab2e9fd467a198b293b276abc08d1a1c6a5e9679d5a89d1b45e31eb64b59238a

  • SHA512

    ee4fa7cbd8f27cd77265f3282850fb5bfa93086034fb94569f2274f1acd93333f4e9a6ed4ea4e2302c429b4a2ed6cd83f404793e9d18fa4f3864fef5209620f9

Malware Config

Targets

    • Target

      bawag.apk

    • Size

      3.4MB

    • MD5

      71e293f29e636112e0a00ebac8cf3eb8

    • SHA1

      c78b484b536d03a71f37c573f1ce5290507ce330

    • SHA256

      ab2e9fd467a198b293b276abc08d1a1c6a5e9679d5a89d1b45e31eb64b59238a

    • SHA512

      ee4fa7cbd8f27cd77265f3282850fb5bfa93086034fb94569f2274f1acd93333f4e9a6ed4ea4e2302c429b4a2ed6cd83f404793e9d18fa4f3864fef5209620f9

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks