General

  • Target

    31fd040e83679096a6204f20a7b4b3e4f587fd2d20b3ed4408550f64b3fafbcf.zip

  • Size

    1.8MB

  • Sample

    230120-r1l57saf2v

  • MD5

    7416c87aaba27a2f79778d6271ba4c81

  • SHA1

    fbd4ea0cb5dff5e795567ff83f68f4934f052816

  • SHA256

    494282bb7fb9c55c1f1405f61e7a13846f8a04f0d87cf9480d4a862a9c61fe6a

  • SHA512

    b13492bd220b3dcb91ce9bbdc46e28ec09d83553f6d384be901c62cc22826121bd60d34dbbc1f1e58acc9e642c042e411f08e9a1443db2df84591c10aa1a413e

  • SSDEEP

    49152:KcPbbnEJAJptAvUktlX8NT8i/W6jkZmnY4WyD95:hbnEJBFrsiiu6oZmnRWyD95

Malware Config

Extracted

Family

hydra

C2

http://lanagarza441.lol

Targets

    • Target

      31fd040e83679096a6204f20a7b4b3e4f587fd2d20b3ed4408550f64b3fafbcf

    • Size

      2.1MB

    • MD5

      3ee8cd8a2fba850f954c8c8af84babd6

    • SHA1

      d2a6b249f009c5a628bbea4986b72e7be6a4e32a

    • SHA256

      31fd040e83679096a6204f20a7b4b3e4f587fd2d20b3ed4408550f64b3fafbcf

    • SHA512

      003d400ffd57a3adc68b9071c801577a1ed5ad27d763d2fc312a1c4d3c9f5eb72ad9c327c73920ee644d6c64fa2d2d9310801ccfbe28f9e3368b80effb69efbd

    • SSDEEP

      24576:Q77t4o5+UWRW3GHF5J3oijoeapmKVVcSnC5BZ9qxI+4kAHfN79vWTaTzG+6wpLM2:U7T80Wl5J3n2wK7hDaHl79q+6fLmdhr9

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks