General

  • Target

    22c6380abe1a2ff9b7d6f6d4baf252e2

  • Size

    3.3MB

  • Sample

    231231-bqqsmsfcd8

  • MD5

    22c6380abe1a2ff9b7d6f6d4baf252e2

  • SHA1

    4226fb895d2ea02c462a6aa4965991ef08a5412f

  • SHA256

    d0775b35bb8cb849d1049e9cea3d990f97bf09e908d19c93ba6ce0c184bfa668

  • SHA512

    c873ac10d58390d919ff4b6ffbb216e7f8dc4cdaeb859b91f4a4d58871a63a1b831b4b0da3ac85f92882a7fe8f6231b4a9545d83e65fc17dfbf9175c8be3d73a

  • SSDEEP

    98304:Jy7LJupxtNBfPDGGQ74yVpfPi0Qto94Uhb:JUdupLU7xVpfq0Mo9Fhb

Malware Config

Targets

    • Target

      22c6380abe1a2ff9b7d6f6d4baf252e2

    • Size

      3.3MB

    • MD5

      22c6380abe1a2ff9b7d6f6d4baf252e2

    • SHA1

      4226fb895d2ea02c462a6aa4965991ef08a5412f

    • SHA256

      d0775b35bb8cb849d1049e9cea3d990f97bf09e908d19c93ba6ce0c184bfa668

    • SHA512

      c873ac10d58390d919ff4b6ffbb216e7f8dc4cdaeb859b91f4a4d58871a63a1b831b4b0da3ac85f92882a7fe8f6231b4a9545d83e65fc17dfbf9175c8be3d73a

    • SSDEEP

      98304:Jy7LJupxtNBfPDGGQ74yVpfPi0Qto94Uhb:JUdupLU7xVpfq0Mo9Fhb

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks