General

  • Target

    2_Chrome_obf.apk

  • Size

    2.7MB

  • Sample

    220802-g3gcmadagl

  • MD5

    95a7f34f3e34c98298c864a530d64346

  • SHA1

    4a5e09d2c3bc795e801b6cbe090cc384573f2a42

  • SHA256

    2ae09bef7398cbf1999263a09949ec9e6baca4d25852a2cf758e546b2f4658ce

  • SHA512

    87c7d2340f25b78f5ca7798b3ee548b5168579ba7b2d7a5bf7c01720d5fe92e3dd5f3f0347ec32b87532c417e4f3effc9d6b15fc04db494ddb08b5510e68f332

Malware Config

Targets

    • Target

      2_Chrome_obf.apk

    • Size

      2.7MB

    • MD5

      95a7f34f3e34c98298c864a530d64346

    • SHA1

      4a5e09d2c3bc795e801b6cbe090cc384573f2a42

    • SHA256

      2ae09bef7398cbf1999263a09949ec9e6baca4d25852a2cf758e546b2f4658ce

    • SHA512

      87c7d2340f25b78f5ca7798b3ee548b5168579ba7b2d7a5bf7c01720d5fe92e3dd5f3f0347ec32b87532c417e4f3effc9d6b15fc04db494ddb08b5510e68f332

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks