General

  • Target

    bawag.apk

  • Size

    3.5MB

  • Sample

    220401-jspblagfb7

  • MD5

    768ec2246d2c92330ba8fafe6513963e

  • SHA1

    dbfc889162a1b786c14afe37618d65dca701d0e2

  • SHA256

    2cca7cac692513aa01467dd9cda3ea98a2a8cde74380b2826294d283a83f4ce7

  • SHA512

    0ca0521a2b5403b607f9df7c27c80d426f2c73dea1692bb6577899ff01ad5aa135da7c52082fe690e4c35c4a64fba40f2a9477ee4e14481d7af7a9a9ba219db0

Malware Config

Targets

    • Target

      bawag.apk

    • Size

      3.5MB

    • MD5

      768ec2246d2c92330ba8fafe6513963e

    • SHA1

      dbfc889162a1b786c14afe37618d65dca701d0e2

    • SHA256

      2cca7cac692513aa01467dd9cda3ea98a2a8cde74380b2826294d283a83f4ce7

    • SHA512

      0ca0521a2b5403b607f9df7c27c80d426f2c73dea1692bb6577899ff01ad5aa135da7c52082fe690e4c35c4a64fba40f2a9477ee4e14481d7af7a9a9ba219db0

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks