Analysis

  • max time kernel
    2781618s
  • max time network
    26s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    02-09-2021 09:16

General

  • Target

    c671393f6b927e60c76c284f6a645c219094430797438f9c020a10399e3f094f.apk

  • Size

    8.2MB

  • MD5

    9e6bd047e07dad9342f72d25e6d33c37

  • SHA1

    0320259263fc5fc400b077b6078efc12e12bf2c4

  • SHA256

    c671393f6b927e60c76c284f6a645c219094430797438f9c020a10399e3f094f

  • SHA512

    39f9f987fa2261bd7af9d75b34069a32d27fa27e71007f4874d15831f846877e3300f13d2ba75572e32943378567460665cdb6d08b38193f3c21fae18c6d5035

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.fmebfbbj.ofhbkjs
    1⤵
    • Loads dropped Dex/Jar
    PID:3646

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads