General

  • Target

    c143da.apk

  • Size

    3.3MB

  • Sample

    220527-yd7a7aacd9

  • MD5

    961b128f14e38b1eefac212a2d369e90

  • SHA1

    b37a61a033b2e61d6c0d3dae200a3543da434b6a

  • SHA256

    c143da0e00aa8d320a85193448c86eeaf7087763f9b75621a560a9043dad4251

  • SHA512

    c1ce85a0134202dfa943b5ce4361dc17802692bc76b0a9b5d5645e51d32c5a815e2b7aff10c7eaafaddb6a35579b9b2e5be810e3bec92dc42ea7494202458419

Malware Config

Targets

    • Target

      c143da.apk

    • Size

      3.3MB

    • MD5

      961b128f14e38b1eefac212a2d369e90

    • SHA1

      b37a61a033b2e61d6c0d3dae200a3543da434b6a

    • SHA256

      c143da0e00aa8d320a85193448c86eeaf7087763f9b75621a560a9043dad4251

    • SHA512

      c1ce85a0134202dfa943b5ce4361dc17802692bc76b0a9b5d5645e51d32c5a815e2b7aff10c7eaafaddb6a35579b9b2e5be810e3bec92dc42ea7494202458419

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks