General

  • Target

    c41eb0c8ad6b311a8eabd431fecbfc3ff578514189c5a75d65604316546cb368.bin

  • Size

    3.0MB

  • Sample

    231017-1wnynshf4t

  • MD5

    bc34c1b3599c5d369491c763c9c4813a

  • SHA1

    d21f63841d0a8827bb8f40d8e6cfddeb50ba6086

  • SHA256

    c41eb0c8ad6b311a8eabd431fecbfc3ff578514189c5a75d65604316546cb368

  • SHA512

    1815ce8a2423d4cdd4982392f3de8b75e3dae75b7e9d682368db7227f5f29da70c0a24fdc878fc02761e621e6f7e744f4f65d26450ae86bb0bae6eafc3a82c70

  • SSDEEP

    49152:T8krsWTxBtwrjxS+LxIvKwwc5gsvL0m2zcTqSYi0J0801E/HnNAiPcl1dIpkJjRd:45VxxPJsT0m9qSYVNASMX1wEjH

Malware Config

Extracted

Family

hydra

C2

http://wandawolmentokez.com

Targets

    • Target

      c41eb0c8ad6b311a8eabd431fecbfc3ff578514189c5a75d65604316546cb368.bin

    • Size

      3.0MB

    • MD5

      bc34c1b3599c5d369491c763c9c4813a

    • SHA1

      d21f63841d0a8827bb8f40d8e6cfddeb50ba6086

    • SHA256

      c41eb0c8ad6b311a8eabd431fecbfc3ff578514189c5a75d65604316546cb368

    • SHA512

      1815ce8a2423d4cdd4982392f3de8b75e3dae75b7e9d682368db7227f5f29da70c0a24fdc878fc02761e621e6f7e744f4f65d26450ae86bb0bae6eafc3a82c70

    • SSDEEP

      49152:T8krsWTxBtwrjxS+LxIvKwwc5gsvL0m2zcTqSYi0J0801E/HnNAiPcl1dIpkJjRd:45VxxPJsT0m9qSYVNASMX1wEjH

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

    • Target

      HM_JsBridge.js

    • Size

      1KB

    • MD5

      f2e7316750f128a4b72a61a9fc8ed362

    • SHA1

      228d0209618cb848f153a4c9daf45112dbe6a5ca

    • SHA256

      45bd4f9fbae5e062f1a2f2a3fb4d71e4de8b54990eb81a8f30bad83ecd6096aa

    • SHA512

      308760b82cfe9fdd625c8528a4ebb4d0a2186b4ffc9ee6d16e0f1ccb73c56e8cf6301c44ef139776242cb24bc9f43308951a4fff49854d0f08603801393aa41d

    Score
    1/10
    • Target

      consentform.html

    • Size

      27KB

    • MD5

      7a2ed1a6df8839dd8936a86d9edccabe

    • SHA1

      7bc1af528444afca678905059cb1ba9fade65352

    • SHA256

      d02fbd55c1b5da3fa1f77c52f5633421395a3bf228457521512b37cdacd65f9c

    • SHA512

      ea0c3e512b37e340f4c0a49196344f1dd5aef38c469ba124605518e913be601a5b6a92a50f00e962bc90041bb80e51480254c7902032d894b7d24be5aec47097

    • SSDEEP

      768:wEh4FOT6bJdK0D7fkvaqF1b6cY4c5rC28c54NTc5Jt:th44GbJdKoncY4c5Wc5wc57

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks