General

  • Target

    e5b8818f512c406deadebf59e7293a68.apk

  • Size

    2.3MB

  • Sample

    220816-wdfr5acabr

  • MD5

    e5b8818f512c406deadebf59e7293a68

  • SHA1

    c5ab3af33be14561b7d5e8a64e195afb69a769d0

  • SHA256

    5f49140c1c0e5be9ebf4cb760b3ae369672c02db11bf8fc73e59c48c9990a3dc

  • SHA512

    359645aced616f2f76a6cbb1ae5f1cf9e58c2040abd9afc97cce5bc7e8bb08ac23d279db028d5eae98b8aa32e32627969dbcf500c69a0c8fcc82e92831a24775

  • SSDEEP

    49152:Ixv0B2ZtolealfkIfTEtA7ik+w5JpM6qG5F6hLd+FgFdplxsQ5:Ixv82ZtoYYwwrp7qm+Ld+OnlxJ

Malware Config

Extracted

Family

hydra

C2

https://maxnote.site

Targets

    • Target

      e5b8818f512c406deadebf59e7293a68.apk

    • Size

      2.3MB

    • MD5

      e5b8818f512c406deadebf59e7293a68

    • SHA1

      c5ab3af33be14561b7d5e8a64e195afb69a769d0

    • SHA256

      5f49140c1c0e5be9ebf4cb760b3ae369672c02db11bf8fc73e59c48c9990a3dc

    • SHA512

      359645aced616f2f76a6cbb1ae5f1cf9e58c2040abd9afc97cce5bc7e8bb08ac23d279db028d5eae98b8aa32e32627969dbcf500c69a0c8fcc82e92831a24775

    • SSDEEP

      49152:Ixv0B2ZtolealfkIfTEtA7ik+w5JpM6qG5F6hLd+FgFdplxsQ5:Ixv82ZtoYYwwrp7qm+Ld+OnlxJ

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks