Analysis
-
max time kernel
3965725s -
max time network
19s -
platform
android_x64 -
resource
android-x64 -
submitted
28-07-2021 09:09
Static task
static1
Behavioral task
behavioral1
Sample
FlashPlayerUpdate.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
General
-
Target
FlashPlayerUpdate.apk
-
Size
7.5MB
-
MD5
4de47a1a6c0db896371ea6d7c3826e02
-
SHA1
0bd2c907249f9abcf86bba8b853247335db51a2b
-
SHA256
3eba7728425ff722be181f04703abc8e4f4972be4ee0a16dbd904ec12f0aeaec
-
SHA512
947dafb8fd89bbe98e148ffe40c759dde245d345b7e0b9300c21c80e5ddbb76b14080d412a6a81800666988d75731a2250df5c33e8a58b235db2929a7bf1dd9a
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.vdzbwmgd.rmqvvos/code_cache/secondary-dexes/base.apk.classes1.zip 3604 com.vdzbwmgd.rmqvvos [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.vdzbwmgd.rmqvvos/code_cache/secondary-dexes/base.apk.classes1.zip] 3604 com.vdzbwmgd.rmqvvos