Analysis

  • max time kernel
    479395s
  • platform
    android_x86
  • resource
    android-x86-arm
  • submitted
    06-08-2021 17:45

General

  • Target

    34081_Video_Oynatıcı.apk

  • Size

    3.1MB

  • MD5

    9974bad66a83878b2307fa9906b47c02

  • SHA1

    d412add72df906b015bbd855d99c7d95fa58e546

  • SHA256

    d48f7a62bd78239ee8381d924088e6e6e048884bc0a9ee538bb2b6a70cad527f

  • SHA512

    b22d0049fc94ebee37565eba70591d3ebeb028c6e63ab52381cede49f244a883335387198766f757085e27a598b5b33ebb91f4bdb7b8c9878f59c83ea034c29d

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses reflection 1 IoCs

Processes

  • com.ntbxausy.rctrzgu
    1⤵
    • Loads dropped Dex/Jar
    • Uses reflection
    PID:4750
    • com.ntbxausy.rctrzgu
      2⤵
        PID:4780
      • /system/bin/dex2oat
        2⤵
        • Loads dropped Dex/Jar
        PID:4780

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads