General

  • Target

    4556936d8864a03fcd3586f6ada4fbce

  • Size

    3.1MB

  • Sample

    220622-se7qfshddn

  • MD5

    4556936d8864a03fcd3586f6ada4fbce

  • SHA1

    11e99f8c4255e1289fa99a6bf04efee9a487d85b

  • SHA256

    d42c56e4bb96482a14b6b432737d73f39a991855feb118b1674c769d095baa66

  • SHA512

    a01fa6ad24e2699dd731053cbe7a3aa9b71d3a5f5abe5d26ae6717d92a5aa934f228e58bb81a154a275933ec7277fadd762cd35fa36dad97148772b422a7873a

Malware Config

Targets

    • Target

      4556936d8864a03fcd3586f6ada4fbce

    • Size

      3.1MB

    • MD5

      4556936d8864a03fcd3586f6ada4fbce

    • SHA1

      11e99f8c4255e1289fa99a6bf04efee9a487d85b

    • SHA256

      d42c56e4bb96482a14b6b432737d73f39a991855feb118b1674c769d095baa66

    • SHA512

      a01fa6ad24e2699dd731053cbe7a3aa9b71d3a5f5abe5d26ae6717d92a5aa934f228e58bb81a154a275933ec7277fadd762cd35fa36dad97148772b422a7873a

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks