General

  • Target

    989b61c69e7bbb1c50a8661975ccb723aa60856b2666c549e0a9f22191d09d8f

  • Size

    6.7MB

  • Sample

    231220-kvklvsgfe9

  • MD5

    0ba895632674c1245059731ccb03e043

  • SHA1

    e4d7f3fcf8836d5c9ea78185b609cc4cb2b97ebc

  • SHA256

    989b61c69e7bbb1c50a8661975ccb723aa60856b2666c549e0a9f22191d09d8f

  • SHA512

    3bb5eb1ab608027cb54c8507fc1c8c87d92e898bf80fe7f70b94ddb962e65d4f7831b53188c3cc4340619580b95920926e94e09f8633df0eae7027d6543c60ef

  • SSDEEP

    196608:s79hBGkJfS+qlDrsyCnhx86A74kCqrMh2yN3:KhBGifHq1syChxHA7yl223

Malware Config

Targets

    • Target

      989b61c69e7bbb1c50a8661975ccb723aa60856b2666c549e0a9f22191d09d8f

    • Size

      6.7MB

    • MD5

      0ba895632674c1245059731ccb03e043

    • SHA1

      e4d7f3fcf8836d5c9ea78185b609cc4cb2b97ebc

    • SHA256

      989b61c69e7bbb1c50a8661975ccb723aa60856b2666c549e0a9f22191d09d8f

    • SHA512

      3bb5eb1ab608027cb54c8507fc1c8c87d92e898bf80fe7f70b94ddb962e65d4f7831b53188c3cc4340619580b95920926e94e09f8633df0eae7027d6543c60ef

    • SSDEEP

      196608:s79hBGkJfS+qlDrsyCnhx86A74kCqrMh2yN3:KhBGifHq1syChxHA7yl223

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Enterprise v15

Tasks