General

  • Target

    78fa950df8e85e4866fbd9536567d1cd

  • Size

    3.0MB

  • Sample

    240127-ccl3zaaha3

  • MD5

    78fa950df8e85e4866fbd9536567d1cd

  • SHA1

    b456d8806dbd21342773f73f120e64f7b0f3f8f7

  • SHA256

    20f45f1e7206b07876501aa829adae3e54b3620e733e7b8fee04c448078143b6

  • SHA512

    606821bd1afcaf6e7179881b6198f24619fd84efb9bf5e2e3d68b47b4510832c12af279993bac0c9f33c080767b62dd9742946be1ecb80c5d6802c67298c1658

  • SSDEEP

    49152:GfieXW1WFm4lnNQ/ZQ7TRcBALMcdg6Y4bAQNFZtqUJS8Zwz5f8Qo+pa:GqeX7k47QQRcDcGN8Z6hk+g

Malware Config

Targets

    • Target

      78fa950df8e85e4866fbd9536567d1cd

    • Size

      3.0MB

    • MD5

      78fa950df8e85e4866fbd9536567d1cd

    • SHA1

      b456d8806dbd21342773f73f120e64f7b0f3f8f7

    • SHA256

      20f45f1e7206b07876501aa829adae3e54b3620e733e7b8fee04c448078143b6

    • SHA512

      606821bd1afcaf6e7179881b6198f24619fd84efb9bf5e2e3d68b47b4510832c12af279993bac0c9f33c080767b62dd9742946be1ecb80c5d6802c67298c1658

    • SSDEEP

      49152:GfieXW1WFm4lnNQ/ZQ7TRcBALMcdg6Y4bAQNFZtqUJS8Zwz5f8Qo+pa:GqeX7k47QQRcDcGN8Z6hk+g

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks