General

  • Target

    0fd6d7acae3f279bd5194c06e33ce37d

  • Size

    3.2MB

  • Sample

    220628-zw5ezsccdp

  • MD5

    0fd6d7acae3f279bd5194c06e33ce37d

  • SHA1

    854c6ed6db41c47f16f6e43f375fa8d611592866

  • SHA256

    d449c3e618ae655b697ccb37618333c6c0fd095a7385a383efc2bcac377818e8

  • SHA512

    f6c3cf38f39f3a9bdbc41342bb2c69b0201307d22bae3aeb56e8a34d53993a0f9f0aa463ce99217b062f010d111f349eb33fc3cf099768a9314dd48613e6361c

Malware Config

Targets

    • Target

      0fd6d7acae3f279bd5194c06e33ce37d

    • Size

      3.2MB

    • MD5

      0fd6d7acae3f279bd5194c06e33ce37d

    • SHA1

      854c6ed6db41c47f16f6e43f375fa8d611592866

    • SHA256

      d449c3e618ae655b697ccb37618333c6c0fd095a7385a383efc2bcac377818e8

    • SHA512

      f6c3cf38f39f3a9bdbc41342bb2c69b0201307d22bae3aeb56e8a34d53993a0f9f0aa463ce99217b062f010d111f349eb33fc3cf099768a9314dd48613e6361c

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks