General

  • Target

    FlashPlayerV1.apk

  • Size

    3.2MB

  • Sample

    220527-hvyglshcb9

  • MD5

    90b53b42373895894c4308255d22c041

  • SHA1

    44febd5e5f5548fe8730091f86e05a899449a48b

  • SHA256

    0172dad67e9b8cf1c3c08433138cf588064d2697c0f3f958fe9819f72b4874c7

  • SHA512

    3ee70379a3c5579d302d7130d473a0fcc52ebc594492243c940d323fd5ff063b51ed9cae98fc8ef9fb4295aea060d4a12711a2ad676c0fbb612b3dcf036daf0e

Malware Config

Targets

    • Target

      FlashPlayerV1.apk

    • Size

      3.2MB

    • MD5

      90b53b42373895894c4308255d22c041

    • SHA1

      44febd5e5f5548fe8730091f86e05a899449a48b

    • SHA256

      0172dad67e9b8cf1c3c08433138cf588064d2697c0f3f958fe9819f72b4874c7

    • SHA512

      3ee70379a3c5579d302d7130d473a0fcc52ebc594492243c940d323fd5ff063b51ed9cae98fc8ef9fb4295aea060d4a12711a2ad676c0fbb612b3dcf036daf0e

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks