General

  • Target

    af2a369aaacd253f2265b1a73748c47946c4a0bc82a56f073f696630daaef44b.apk

  • Size

    3.2MB

  • Sample

    220809-wtf3tsebbk

  • MD5

    438313a34c7d4dd7542930f6abade1d6

  • SHA1

    f8baf32d3214cd35756ce2f753a9e7cdb80e6ea4

  • SHA256

    af2a369aaacd253f2265b1a73748c47946c4a0bc82a56f073f696630daaef44b

  • SHA512

    54909a117fc5296ed3d301ca498c03caadfa8bb049922da7c09cd17db3e506d91752ea8ba429bd0a84438d9079e6d7bfb4e37306578d0483cb0292c21550f305

Malware Config

Targets

    • Target

      af2a369aaacd253f2265b1a73748c47946c4a0bc82a56f073f696630daaef44b.apk

    • Size

      3.2MB

    • MD5

      438313a34c7d4dd7542930f6abade1d6

    • SHA1

      f8baf32d3214cd35756ce2f753a9e7cdb80e6ea4

    • SHA256

      af2a369aaacd253f2265b1a73748c47946c4a0bc82a56f073f696630daaef44b

    • SHA512

      54909a117fc5296ed3d301ca498c03caadfa8bb049922da7c09cd17db3e506d91752ea8ba429bd0a84438d9079e6d7bfb4e37306578d0483cb0292c21550f305

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks