General

  • Target

    lolipop.apk

  • Size

    3.2MB

  • Sample

    220803-j4855saafr

  • MD5

    c18a3b53ef3bdbfbe7ff86b5628912b7

  • SHA1

    6b4bb3c0b598bde22370433765418b64f6e594fd

  • SHA256

    9c9bc75ce675754c655b0757a8655ff50186b1626862bcb5b8200c4047f3ab3c

  • SHA512

    9d176585d882a10d0049060267aedada2954908aa21b1651cde811bcb53ed4bc9fbaefae98388a0613e37940043718c2a6735f96afbff8788f243916c297cb5d

Malware Config

Targets

    • Target

      lolipop.apk

    • Size

      3.2MB

    • MD5

      c18a3b53ef3bdbfbe7ff86b5628912b7

    • SHA1

      6b4bb3c0b598bde22370433765418b64f6e594fd

    • SHA256

      9c9bc75ce675754c655b0757a8655ff50186b1626862bcb5b8200c4047f3ab3c

    • SHA512

      9d176585d882a10d0049060267aedada2954908aa21b1651cde811bcb53ed4bc9fbaefae98388a0613e37940043718c2a6735f96afbff8788f243916c297cb5d

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks