General

  • Target

    E3DCF86812F72B774EE51563538AD2DEB75ABA98C583A561046D98E2A41D47F8.apk

  • Size

    1014KB

  • Sample

    220512-nfzn1scec8

  • MD5

    a32c36009a37893be90e4f385b26b5ee

  • SHA1

    1f3f0652c0d89c4907281d76de3c983373a5fcb2

  • SHA256

    e3dcf86812f72b774ee51563538ad2deb75aba98c583a561046d98e2a41d47f8

  • SHA512

    9358f3b1d5a48f8d438ca25f4dd8cb5cbc6887f7f1bd69b92d573c19d9857713c17e4a3d310b72d91d1fe419816fe1061ca8d96492d380af1b9dc0104adde7b4

Malware Config

Extracted

Family

hydra

C2

http://franciszekforster223.top

Targets

    • Target

      E3DCF86812F72B774EE51563538AD2DEB75ABA98C583A561046D98E2A41D47F8.apk

    • Size

      1014KB

    • MD5

      a32c36009a37893be90e4f385b26b5ee

    • SHA1

      1f3f0652c0d89c4907281d76de3c983373a5fcb2

    • SHA256

      e3dcf86812f72b774ee51563538ad2deb75aba98c583a561046d98e2a41d47f8

    • SHA512

      9358f3b1d5a48f8d438ca25f4dd8cb5cbc6887f7f1bd69b92d573c19d9857713c17e4a3d310b72d91d1fe419816fe1061ca8d96492d380af1b9dc0104adde7b4

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks