General

  • Target

    Google_chrome.apk

  • Size

    4.9MB

  • Sample

    220722-tzsmpsgde2

  • MD5

    0df076628ae1c36d1a83adb1f0aa9da7

  • SHA1

    e395429b36986a6a9a38b4f8c16f770881bfa9cd

  • SHA256

    d5e69da84b83863f1fce0654244ee69a8dbbdc3727a654c3e06b2e1eb0f27a26

  • SHA512

    30b489ea8a06511955a53b5b605e5f7b78bccf3566ec1f517ea062e5b21c98b8a4cca2bcda9d41a6f7b13cd714e5f9bf695676d92d5a5f336c16fb0dc82d8e03

Malware Config

Extracted

Family

joker

C2

https://cloudpin-detail.oss-accelerate.aliyuncs.com

Extracted

Family

hydra

C2

https://maxnote.site

Targets

    • Target

      Google_chrome.apk

    • Size

      4.9MB

    • MD5

      0df076628ae1c36d1a83adb1f0aa9da7

    • SHA1

      e395429b36986a6a9a38b4f8c16f770881bfa9cd

    • SHA256

      d5e69da84b83863f1fce0654244ee69a8dbbdc3727a654c3e06b2e1eb0f27a26

    • SHA512

      30b489ea8a06511955a53b5b605e5f7b78bccf3566ec1f517ea062e5b21c98b8a4cca2bcda9d41a6f7b13cd714e5f9bf695676d92d5a5f336c16fb0dc82d8e03

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks