Analysis

  • max time kernel
    4078287s
  • max time network
    19s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    29-07-2021 16:25

General

  • Target

    777f75d098d841673f9cda2ba28983fa181b6b92ac7c7ffb0dc04fbd6bb4a153.apk

  • Size

    6.8MB

  • MD5

    04533b259e5623638184a37ce8a16ffb

  • SHA1

    1554d45d107ea56bdece179d7f3b1cefeff300c7

  • SHA256

    777f75d098d841673f9cda2ba28983fa181b6b92ac7c7ffb0dc04fbd6bb4a153

  • SHA512

    d5ad94ce47a197fa26e857eb2abe9da88d3c7f5e7f33cd262e7c54a494b2a5308363e3cac5a0e11a983e2fb60131a501049b9621f4036957eabc05d9b555a53c

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 3 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.qkjwie45.ngirwii
    1⤵
    • Loads dropped Dex/Jar
    PID:3606

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads