Analysis
-
max time kernel
289961s -
max time network
19s -
platform
android_x64 -
resource
android-x64 -
submitted
04-08-2021 13:09
Static task
static1
Behavioral task
behavioral1
Sample
5be75abccd902ab7be159797b23bb41ca1055602a08130cebb147d6712be55fe.apk
Resource
android-x64
0 signatures
0 seconds
General
-
Target
5be75abccd902ab7be159797b23bb41ca1055602a08130cebb147d6712be55fe.apk
-
Size
7.5MB
-
MD5
bcf35b304c80aabf4a57e1d22132d507
-
SHA1
9e7af980d678de60460f9786b9ed04d4337f2315
-
SHA256
5be75abccd902ab7be159797b23bb41ca1055602a08130cebb147d6712be55fe
-
SHA512
11dda802b3e8aeedb3488cbd0a79a09698772616d66d92c39b183d982cf478e39e63bd0498c55199c6bf5e19c5d1130d1b90ae77011bdfeeb9f5a2b613d97549
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.eehiyqwy.jqetspo/code_cache/secondary-dexes/base.apk.classes1.zip 3603 com.eehiyqwy.jqetspo [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.eehiyqwy.jqetspo/code_cache/secondary-dexes/base.apk.classes1.zip] 3603 com.eehiyqwy.jqetspo