General

  • Target

    f9fff0bccb018212346fd00c76015c4afffc89f739d76330ba210c48ca662d74

  • Size

    4.0MB

  • Sample

    220508-h8e77abaa5

  • MD5

    e7a4a02d2c1e0c90af2ce66be570faeb

  • SHA1

    7f9771683ac59c2efd27a5693275d46ff3b71d15

  • SHA256

    f9fff0bccb018212346fd00c76015c4afffc89f739d76330ba210c48ca662d74

  • SHA512

    4b1537d34d5975c3ddf283b1b426e11dd614a5c8fb41f5d1f65feb3211debeb766832378f591b71814e9453ea5b831003fc280e9c7f26f31702e6f735e1ae942

Malware Config

Targets

    • Target

      f9fff0bccb018212346fd00c76015c4afffc89f739d76330ba210c48ca662d74

    • Size

      4.0MB

    • MD5

      e7a4a02d2c1e0c90af2ce66be570faeb

    • SHA1

      7f9771683ac59c2efd27a5693275d46ff3b71d15

    • SHA256

      f9fff0bccb018212346fd00c76015c4afffc89f739d76330ba210c48ca662d74

    • SHA512

      4b1537d34d5975c3ddf283b1b426e11dd614a5c8fb41f5d1f65feb3211debeb766832378f591b71814e9453ea5b831003fc280e9c7f26f31702e6f735e1ae942

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks