General

  • Target

    latte.apk

  • Size

    3.2MB

  • Sample

    220803-j54l2saahk

  • MD5

    2766fe2cc89890935127ae864f88a309

  • SHA1

    f7dc91ed1d4c85e72896b22acb9f192a36ca9ae3

  • SHA256

    93c5e98c06963c8a320f5876148ad45fb6cce1a40a7aaee195cfa5027e19426b

  • SHA512

    a9b59137d044d134417f63d38c361b9f5961f10915794a70c65e95a06bd6bdb5299325915b32be398808aabfd7aad5faea5a6b6617261b20a54f0fabb54f3ecb

Malware Config

Targets

    • Target

      latte.apk

    • Size

      3.2MB

    • MD5

      2766fe2cc89890935127ae864f88a309

    • SHA1

      f7dc91ed1d4c85e72896b22acb9f192a36ca9ae3

    • SHA256

      93c5e98c06963c8a320f5876148ad45fb6cce1a40a7aaee195cfa5027e19426b

    • SHA512

      a9b59137d044d134417f63d38c361b9f5961f10915794a70c65e95a06bd6bdb5299325915b32be398808aabfd7aad5faea5a6b6617261b20a54f0fabb54f3ecb

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Enterprise v6

Tasks