Analysis

  • max time kernel
    719407s
  • max time network
    46s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    09-08-2021 12:26

General

  • Target

    87362_Video_Oynatıcı.apk

  • Size

    3.1MB

  • MD5

    141f171526468a833b82651bdc5076e2

  • SHA1

    bd25a345c660790d0afd89a89c51616d0fe87ce8

  • SHA256

    d0e3ea241c345f8988d9f0b9064c1ac1cce7bb2390b28021ee925097372a8308

  • SHA512

    c1b41d1ea501f7a5f3ca883c554c443a7178b417d7957d3b1f28d8a0aa02162f891f519e2d43b9dd2bc07cb07e6014fbc241b6be96299a66f3dea2b16db8aefe

Malware Config

Extracted

Family

hydra

C2

http://courteneyguerrero584.xyz

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses reflection 3 IoCs

Processes

  • com.glvygfsf.qnnlsls
    1⤵
    • Loads dropped Dex/Jar
    • Uses reflection
    PID:4317

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads