General

  • Target

    psk.apk

  • Size

    2.9MB

  • Sample

    220516-jps6dafeg3

  • MD5

    147ef9f8890c63a44610520d0391e9b0

  • SHA1

    6b58f1ef78d0d3481f9037cbb43a14b91f4e3be9

  • SHA256

    bc8d4ef11a68a6523a3a762ae5a5ce670e2fc4def138a3e4da762615325e8a13

  • SHA512

    1f9faa8c5e36b38d079bc1e39f2540fe2ff32e6ed2cbe97a4cddacd5a8ee12f1ebc073834dbc8dad8176b7c6e1af2e46f09acecefb44c7c303a2c2a81fea1829

Malware Config

Targets

    • Target

      psk.apk

    • Size

      2.9MB

    • MD5

      147ef9f8890c63a44610520d0391e9b0

    • SHA1

      6b58f1ef78d0d3481f9037cbb43a14b91f4e3be9

    • SHA256

      bc8d4ef11a68a6523a3a762ae5a5ce670e2fc4def138a3e4da762615325e8a13

    • SHA512

      1f9faa8c5e36b38d079bc1e39f2540fe2ff32e6ed2cbe97a4cddacd5a8ee12f1ebc073834dbc8dad8176b7c6e1af2e46f09acecefb44c7c303a2c2a81fea1829

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks