General

  • Target

    99e0053475ecd6a22b0e22b2441f0bf0a407b36be54e7d8220bb284c0bd494a8

  • Size

    3.4MB

  • Sample

    230124-f9vyxsgg72

  • MD5

    2d21b43e6027134281324f460fc7fc66

  • SHA1

    3d6bf52403c493e92140a52149898bc64f76e359

  • SHA256

    99e0053475ecd6a22b0e22b2441f0bf0a407b36be54e7d8220bb284c0bd494a8

  • SHA512

    029eb7cff7ccf74b93f4667c786ba50320deee4f5c49bbe3ec1ca0bc8a8d0c34038a52931ffce6fa309f6e71fb1771a69f27ba373fc35308abbbaf2254607f97

  • SSDEEP

    49152:5uLlr42cZpvL7zVfiHqF3UzV1cx4ZfWmpPSPWR1m/s6/wLZfuY79S77qF6qW5bMN:5+UvL7zVfticx4ZfHmiEEZfpSKFGVrc

Malware Config

Targets

    • Target

      99e0053475ecd6a22b0e22b2441f0bf0a407b36be54e7d8220bb284c0bd494a8

    • Size

      3.4MB

    • MD5

      2d21b43e6027134281324f460fc7fc66

    • SHA1

      3d6bf52403c493e92140a52149898bc64f76e359

    • SHA256

      99e0053475ecd6a22b0e22b2441f0bf0a407b36be54e7d8220bb284c0bd494a8

    • SHA512

      029eb7cff7ccf74b93f4667c786ba50320deee4f5c49bbe3ec1ca0bc8a8d0c34038a52931ffce6fa309f6e71fb1771a69f27ba373fc35308abbbaf2254607f97

    • SSDEEP

      49152:5uLlr42cZpvL7zVfiHqF3UzV1cx4ZfWmpPSPWR1m/s6/wLZfuY79S77qF6qW5bMN:5+UvL7zVfticx4ZfHmiEEZfpSKFGVrc

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks