Analysis

  • max time kernel
    977151s
  • platform
    android_x86
  • resource
    android-x86-arm
  • submitted
    12/08/2021, 11:59 UTC

General

  • Target

    20753_Video_Oynatıcı.apk

  • Size

    3.0MB

  • MD5

    7d4fbe19dceb54f2d090926ed3cd29aa

  • SHA1

    0d235b7345fc3672c8fbd8d980f5598b643ff7e1

  • SHA256

    0a50cbf672d0be762bc86f72fe6d9b02c025ee7cb78c60bde53ccbccb6a88857

  • SHA512

    fa4a72357d5f8958040a7bd1c7f8794b21c9ccaca593ccc990aa0cd47800549cf93c570121c433dacf005b32dcd68b7ee067bddc2e0f904491598d6c15d9cf61

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses reflection 1 IoCs

Processes

  • com.xormiofc.nbeyqyw
    1⤵
    • Loads dropped Dex/Jar
    • Uses reflection
    PID:4740
    • com.xormiofc.nbeyqyw
      2⤵
        PID:4772
      • /system/bin/dex2oat
        2⤵
        • Loads dropped Dex/Jar
        PID:4772

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.