General

  • Target

    Google_Play_Store.apk

  • Size

    2.2MB

  • Sample

    220815-fk8tgshcd2

  • MD5

    40fc97a5fe3be6cb3879392881ca8b62

  • SHA1

    2f311abbfb0803d5ab36d4b77029c277edcc86c2

  • SHA256

    9501e061fb8c1b44a3733b3bab0c13429346b449c721792a41accfacccbd5dd2

  • SHA512

    36428b4ef6a661b74333f103c5fa73bd318808b06731a892bbf6b09b0f775a8db74e12dd184e2e8e1b96f54602779c27343d6bc50c3c31b29733ef22c3369ccc

Malware Config

Extracted

Family

hydra

C2

http://hagkokyogedses.net

Targets

    • Target

      Google_Play_Store.apk

    • Size

      2.2MB

    • MD5

      40fc97a5fe3be6cb3879392881ca8b62

    • SHA1

      2f311abbfb0803d5ab36d4b77029c277edcc86c2

    • SHA256

      9501e061fb8c1b44a3733b3bab0c13429346b449c721792a41accfacccbd5dd2

    • SHA512

      36428b4ef6a661b74333f103c5fa73bd318808b06731a892bbf6b09b0f775a8db74e12dd184e2e8e1b96f54602779c27343d6bc50c3c31b29733ef22c3369ccc

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks