Analysis

  • max time kernel
    4073997s
  • max time network
    21s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    29-07-2021 14:54

General

  • Target

    Player.apk

  • Size

    7.6MB

  • MD5

    8a603a5345a383458b1c8fec2f8508a5

  • SHA1

    cc4dcc5dfa8d0ca91d4db30eac502709d867ca57

  • SHA256

    533ef52c0f797cf7e2933860034cbd8c4c2cab040c11cb3c55a599c96e519e67

  • SHA512

    04e4b4e23fe1add662eabefdfcb2584b27e8c8cc41035b199a159bec7d67f3a0f74907f3e7e16ef6136ce9cc3a77a230fb95a856df920c91052a1511e33185b1

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 3 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.uh88ctwr.og2w6oc
    1⤵
    • Loads dropped Dex/Jar
    PID:3640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads