General

  • Target

    8686312c317336f0bb7b8e8344d4c98f.apk

  • Size

    2.4MB

  • Sample

    220816-vdwmxaeeh6

  • MD5

    8686312c317336f0bb7b8e8344d4c98f

  • SHA1

    bd4a06863d1241aab3cf9edf5316c1501d2b2f95

  • SHA256

    5ddd49654d77b13a19cec37ab0db53095355be864405ca7fe10536813217d189

  • SHA512

    fa7e9bc51fbb2215c066b3a1d00d6178f5bd84e5c0ee29507753d7b52dfb1f0a91f10d668bd23c00565a5df8df3ef3d4035e78f7f891aa879955e4069e5780da

  • SSDEEP

    49152:3ZyMHFd2lD4BspO1OkoYVmLxxeqXIn+zoxZ3Q3FUq50miuDI:3ZyaFdWDPpODwLKPsqQVz6wDI

Malware Config

Extracted

Family

hydra

C2

https://notpro.top

Targets

    • Target

      8686312c317336f0bb7b8e8344d4c98f.apk

    • Size

      2.4MB

    • MD5

      8686312c317336f0bb7b8e8344d4c98f

    • SHA1

      bd4a06863d1241aab3cf9edf5316c1501d2b2f95

    • SHA256

      5ddd49654d77b13a19cec37ab0db53095355be864405ca7fe10536813217d189

    • SHA512

      fa7e9bc51fbb2215c066b3a1d00d6178f5bd84e5c0ee29507753d7b52dfb1f0a91f10d668bd23c00565a5df8df3ef3d4035e78f7f891aa879955e4069e5780da

    • SSDEEP

      49152:3ZyMHFd2lD4BspO1OkoYVmLxxeqXIn+zoxZ3Q3FUq50miuDI:3ZyaFdWDPpODwLKPsqQVz6wDI

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks