General

  • Target

    61e49ea8ac3572e344c27742a2d53266df15266d0163470bbb56e5cd7ad78a4b.zip

  • Size

    7.7MB

  • Sample

    240103-slaz3ahhd5

  • MD5

    86a3403d7a9b5a70b5ab1074e6faea47

  • SHA1

    eed67e0b464ff00aa14e9122d618bf063f2156e5

  • SHA256

    61e49ea8ac3572e344c27742a2d53266df15266d0163470bbb56e5cd7ad78a4b

  • SHA512

    91b516f4cf76cd77c2e333506ce320ab1f6645c67d31b18a6e67c208831bb5870de05aacfd0834457c9418b5067bbc17f53a8e9afe5d274d05e31c389bd75f27

  • SSDEEP

    196608:LKWKndNMyQI4/FVjt/NMC1NC3lDWx0RiQdyjynFAL9z:OWKdNMyQfNVjMzWabyj40z

Malware Config

Targets

    • Target

      61e49ea8ac3572e344c27742a2d53266df15266d0163470bbb56e5cd7ad78a4b.zip

    • Size

      7.7MB

    • MD5

      86a3403d7a9b5a70b5ab1074e6faea47

    • SHA1

      eed67e0b464ff00aa14e9122d618bf063f2156e5

    • SHA256

      61e49ea8ac3572e344c27742a2d53266df15266d0163470bbb56e5cd7ad78a4b

    • SHA512

      91b516f4cf76cd77c2e333506ce320ab1f6645c67d31b18a6e67c208831bb5870de05aacfd0834457c9418b5067bbc17f53a8e9afe5d274d05e31c389bd75f27

    • SSDEEP

      196608:LKWKndNMyQI4/FVjt/NMC1NC3lDWx0RiQdyjynFAL9z:OWKdNMyQfNVjMzWabyj40z

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks