General

  • Target

    54defb64488f34dbee4b8105e57a1823ad454a0ab8d3a960f286ee633004012d

  • Size

    5.0MB

  • Sample

    220508-h8f5gsbaa6

  • MD5

    dc6c21be944f83fb20c5b6bbd2328908

  • SHA1

    b5adf614b60b4804cfe7171cdf00df0ce19b0785

  • SHA256

    54defb64488f34dbee4b8105e57a1823ad454a0ab8d3a960f286ee633004012d

  • SHA512

    a18a740bb41f426934d6cb09e4f772177fbba0f6da4d1c72e4c00ccb41a13b09b3a19b27653864ac0344f87d108491ea7058c779d544da14f523c0f860910057

Malware Config

Targets

    • Target

      54defb64488f34dbee4b8105e57a1823ad454a0ab8d3a960f286ee633004012d

    • Size

      5.0MB

    • MD5

      dc6c21be944f83fb20c5b6bbd2328908

    • SHA1

      b5adf614b60b4804cfe7171cdf00df0ce19b0785

    • SHA256

      54defb64488f34dbee4b8105e57a1823ad454a0ab8d3a960f286ee633004012d

    • SHA512

      a18a740bb41f426934d6cb09e4f772177fbba0f6da4d1c72e4c00ccb41a13b09b3a19b27653864ac0344f87d108491ea7058c779d544da14f523c0f860910057

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks