Analysis

  • max time kernel
    6864s
  • platform
    android_x86
  • resource
    android-x86-arm
  • submitted
    01-08-2021 06:28

General

  • Target

    62704_Video_Oynatıcı.apk

  • Size

    2.6MB

  • MD5

    52701a605c761762de193f011a141996

  • SHA1

    7290ab6e0185920dcdc06aa9e20a85463d6ee8fe

  • SHA256

    62c4f65a03143e0e6f2993048b84912b8191979f10fc9a8977848ab2eca21c3d

  • SHA512

    a906b43efa4f2a25086172b0d3216db2d0fc277fafd438b736927406cd6e22e8ec9b6db05cf5993d5c553adced0097191528c2befc636396568d4e34074d0c86

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests enabling of the accessibility settings. 1 IoCs
  • Uses reflection 1 IoCs

Processes

  • com.wxsegdyb.bhdvikk
    1⤵
    • Loads dropped Dex/Jar
    • Requests enabling of the accessibility settings.
    • Uses reflection
    PID:5064
    • com.wxsegdyb.bhdvikk
      2⤵
        PID:5092
      • /system/bin/dex2oat
        2⤵
        • Loads dropped Dex/Jar
        PID:5092

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads