General

  • Target

    bawag.apk

  • Size

    3.3MB

  • Sample

    220404-lpbx7sdcg4

  • MD5

    3fd6cadb8e556a5b6a65c5e88d7bcb3d

  • SHA1

    cc9c0d48261bf2a68d236360b80ac6af1e2aa59c

  • SHA256

    5c750209d2f8d60504708a4107e7e11b6f4d3b425e7f98b2549635aece29e6a1

  • SHA512

    28f6010325c1c600b4ec4936a298fcc5ae163384bf5c177e9ef1161539c24261be84cb63954c84e42277e408b20f961adfb4f4e45cf5e1e120d6b794c5543c48

Malware Config

Targets

    • Target

      bawag.apk

    • Size

      3.3MB

    • MD5

      3fd6cadb8e556a5b6a65c5e88d7bcb3d

    • SHA1

      cc9c0d48261bf2a68d236360b80ac6af1e2aa59c

    • SHA256

      5c750209d2f8d60504708a4107e7e11b6f4d3b425e7f98b2549635aece29e6a1

    • SHA512

      28f6010325c1c600b4ec4936a298fcc5ae163384bf5c177e9ef1161539c24261be84cb63954c84e42277e408b20f961adfb4f4e45cf5e1e120d6b794c5543c48

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks