Analysis
-
max time kernel
4073997s -
max time network
21s -
platform
android_x64 -
resource
android-x64 -
submitted
29-07-2021 14:54
Static task
static1
Behavioral task
behavioral1
Sample
Player.apk
Resource
android-x64
0 signatures
0 seconds
General
-
Target
Player.apk
-
Size
7.6MB
-
MD5
8a603a5345a383458b1c8fec2f8508a5
-
SHA1
cc4dcc5dfa8d0ca91d4db30eac502709d867ca57
-
SHA256
533ef52c0f797cf7e2933860034cbd8c4c2cab040c11cb3c55a599c96e519e67
-
SHA512
04e4b4e23fe1add662eabefdfcb2584b27e8c8cc41035b199a159bec7d67f3a0f74907f3e7e16ef6136ce9cc3a77a230fb95a856df920c91052a1511e33185b1
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.uh88ctwr.og2w6oc/app_apkprotector_dex/aiZSZ94d.fz 3640 com.uh88ctwr.og2w6oc /data/user/0/com.uh88ctwr.og2w6oc/app_apkprotector_dex/aiZSZ94d.fz 3640 com.uh88ctwr.og2w6oc /data/data/com.uh88ctwr.og2w6oc/app_apkprotector_dex/aiZSZ94d.fz 3640 com.uh88ctwr.og2w6oc