General

  • Target

    bawag.apk

  • Size

    3.4MB

  • Sample

    220401-lt2pesecbp

  • MD5

    c34d943b9dc1618d424af57cbdfa4a6e

  • SHA1

    6e6487c3b689201b43621b47319a7f6514fa64ea

  • SHA256

    3fe3d4f0cbdebb784d1a96dc7d9a4ecd4e9c080860bfa87e50084930aa0d4198

  • SHA512

    b46ae181e732b00c3eebef1b2e30db786a2a28075de072f98baf54c84cbff674c74500add8f0b58a674cc566f6b982c8c010629102dd3a1a94f8cd92996d78c3

Malware Config

Targets

    • Target

      bawag.apk

    • Size

      3.4MB

    • MD5

      c34d943b9dc1618d424af57cbdfa4a6e

    • SHA1

      6e6487c3b689201b43621b47319a7f6514fa64ea

    • SHA256

      3fe3d4f0cbdebb784d1a96dc7d9a4ecd4e9c080860bfa87e50084930aa0d4198

    • SHA512

      b46ae181e732b00c3eebef1b2e30db786a2a28075de072f98baf54c84cbff674c74500add8f0b58a674cc566f6b982c8c010629102dd3a1a94f8cd92996d78c3

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks