General

  • Target

    ddcc9bafbda3a100fb51fa1aedda0844.apk

  • Size

    1.5MB

  • Sample

    220728-ldb4tseggl

  • MD5

    ddcc9bafbda3a100fb51fa1aedda0844

  • SHA1

    2a32003ed69b46408faa0549eac55539e97e7cfc

  • SHA256

    aa7c6d80939deabe2540d1354a5aedeb842c227a76a9b913c8429e4fdd9adee2

  • SHA512

    796396e02806ee89d7e44d87d928f3f19e4c431ffe37b19bfa2267160b80b7ded9692b21513223fe40ef9f783dd342bcfbb158e9e00616936bec10c2feb72c1f

Malware Config

Extracted

Family

hydra

C2

http://sarah-louisewoodcock56.top

Targets

    • Target

      ddcc9bafbda3a100fb51fa1aedda0844.apk

    • Size

      1.5MB

    • MD5

      ddcc9bafbda3a100fb51fa1aedda0844

    • SHA1

      2a32003ed69b46408faa0549eac55539e97e7cfc

    • SHA256

      aa7c6d80939deabe2540d1354a5aedeb842c227a76a9b913c8429e4fdd9adee2

    • SHA512

      796396e02806ee89d7e44d87d928f3f19e4c431ffe37b19bfa2267160b80b7ded9692b21513223fe40ef9f783dd342bcfbb158e9e00616936bec10c2feb72c1f

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks