General

  • Target

    doc_hy_0806_obf_3.apk

  • Size

    3.2MB

  • Sample

    220608-s224gshff9

  • MD5

    116fea8c63bce4908ec1307e20ed96ba

  • SHA1

    4155c71ee1e03cefe5b67bc89c2235266327baa4

  • SHA256

    c7300e6de3d9c6f1ad622a1e884f00d43340c381fb87c87514ef3ca2156fdf5b

  • SHA512

    8e3c99beef9fc1130caab4ecc884da59f2a5c82102b2f61eef44adf7c55595923951203314439e72ef543bfeb232554d06a92ca820f7fa6df19a31d1eb590036

Malware Config

Targets

    • Target

      doc_hy_0806_obf_3.apk

    • Size

      3.2MB

    • MD5

      116fea8c63bce4908ec1307e20ed96ba

    • SHA1

      4155c71ee1e03cefe5b67bc89c2235266327baa4

    • SHA256

      c7300e6de3d9c6f1ad622a1e884f00d43340c381fb87c87514ef3ca2156fdf5b

    • SHA512

      8e3c99beef9fc1130caab4ecc884da59f2a5c82102b2f61eef44adf7c55595923951203314439e72ef543bfeb232554d06a92ca820f7fa6df19a31d1eb590036

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks