General

  • Target

    fffffffff.apk

  • Size

    3.1MB

  • Sample

    220523-zfmj8sffc3

  • MD5

    0fdca6790eaeecfa67508b31a429e424

  • SHA1

    ff05f9fe48d2c4f82d91dbb601ae0483311fe86c

  • SHA256

    e3ccad0c792bb1fef21740837b9049bb91106bdc813948ce7d3f9d8984edda7d

  • SHA512

    b65988b15783a77cf23ec6c9836df5e40efeb7d1d8280b5a54f23e98c665da228adbfa8992b5d681966c7ead67f2e163ca368766e53926b71fc1da4085dd2d4e

Malware Config

Targets

    • Target

      fffffffff.apk

    • Size

      3.1MB

    • MD5

      0fdca6790eaeecfa67508b31a429e424

    • SHA1

      ff05f9fe48d2c4f82d91dbb601ae0483311fe86c

    • SHA256

      e3ccad0c792bb1fef21740837b9049bb91106bdc813948ce7d3f9d8984edda7d

    • SHA512

      b65988b15783a77cf23ec6c9836df5e40efeb7d1d8280b5a54f23e98c665da228adbfa8992b5d681966c7ead67f2e163ca368766e53926b71fc1da4085dd2d4e

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks