Analysis
-
max time kernel
719421s -
platform
android_x86 -
resource
android-x86-arm -
submitted
09-08-2021 12:26
Static task
static1
Behavioral task
behavioral1
Sample
87362_Video_Oynatıcı.apk
Resource
android-x86-arm
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
87362_Video_Oynatıcı.apk
Resource
android-x64-arm64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
87362_Video_Oynatıcı.apk
Resource
android-x64
0 signatures
0 seconds
General
-
Target
87362_Video_Oynatıcı.apk
-
Size
3.1MB
-
MD5
141f171526468a833b82651bdc5076e2
-
SHA1
bd25a345c660790d0afd89a89c51616d0fe87ce8
-
SHA256
d0e3ea241c345f8988d9f0b9064c1ac1cce7bb2390b28021ee925097372a8308
-
SHA512
c1b41d1ea501f7a5f3ca883c554c443a7178b417d7957d3b1f28d8a0aa02162f891f519e2d43b9dd2bc07cb07e6014fbc241b6be96299a66f3dea2b16db8aefe
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.glvygfsf.qnnlsls/code_cache/secondary-dexes/base.apk.classes1.zip 5078 /system/bin/dex2oat /data/user/0/com.glvygfsf.qnnlsls/code_cache/secondary-dexes/base.apk.classes1.zip 5051 com.glvygfsf.qnnlsls -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.glvygfsf.qnnlsls -
Uses reflection 1 IoCs
description pid Process Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE 5051 com.glvygfsf.qnnlsls