Analysis

  • max time kernel
    6845s
  • max time network
    151s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    01-08-2021 06:28

General

  • Target

    62704_Video_Oynatıcı.apk

  • Size

    2.6MB

  • MD5

    52701a605c761762de193f011a141996

  • SHA1

    7290ab6e0185920dcdc06aa9e20a85463d6ee8fe

  • SHA256

    62c4f65a03143e0e6f2993048b84912b8191979f10fc9a8977848ab2eca21c3d

  • SHA512

    a906b43efa4f2a25086172b0d3216db2d0fc277fafd438b736927406cd6e22e8ec9b6db05cf5993d5c553adced0097191528c2befc636396568d4e34074d0c86

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests enabling of the accessibility settings. 1 IoCs
  • Reads name of network operator 1 IoCs

    Uses Android APIs to discover system information.

  • Uses reflection 3 IoCs

Processes

  • com.wxsegdyb.bhdvikk
    1⤵
    • Loads dropped Dex/Jar
    • Requests enabling of the accessibility settings.
    • Reads name of network operator
    • Uses reflection
    PID:4155

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads