General

  • Target

    bawag.apk

  • Size

    3.5MB

  • Sample

    220406-hcb6nabde8

  • MD5

    d61a1d957f3f509220adcd1e7f975153

  • SHA1

    df6c31c0e052b861b73e12dbf15942a9d5aa7770

  • SHA256

    6615ce1e651653426e799bc5e07823ed6628c89fea5e7ee372d7440968ef028e

  • SHA512

    5574cba6fbe072945a1e00f5889ee9a6fde336002e636046a8f6c4a865981465bf37f67213a3c8a41c65a53916da9b6607c5441ed83969ffee358e931c24be5c

Malware Config

Targets

    • Target

      bawag.apk

    • Size

      3.5MB

    • MD5

      d61a1d957f3f509220adcd1e7f975153

    • SHA1

      df6c31c0e052b861b73e12dbf15942a9d5aa7770

    • SHA256

      6615ce1e651653426e799bc5e07823ed6628c89fea5e7ee372d7440968ef028e

    • SHA512

      5574cba6fbe072945a1e00f5889ee9a6fde336002e636046a8f6c4a865981465bf37f67213a3c8a41c65a53916da9b6607c5441ed83969ffee358e931c24be5c

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks