Analysis
-
max time kernel
2781618s -
max time network
26s -
platform
android_x64 -
resource
android-x64 -
submitted
02-09-2021 09:16
Static task
static1
Behavioral task
behavioral1
Sample
c671393f6b927e60c76c284f6a645c219094430797438f9c020a10399e3f094f.apk
Resource
android-x64
0 signatures
0 seconds
General
-
Target
c671393f6b927e60c76c284f6a645c219094430797438f9c020a10399e3f094f.apk
-
Size
8.2MB
-
MD5
9e6bd047e07dad9342f72d25e6d33c37
-
SHA1
0320259263fc5fc400b077b6078efc12e12bf2c4
-
SHA256
c671393f6b927e60c76c284f6a645c219094430797438f9c020a10399e3f094f
-
SHA512
39f9f987fa2261bd7af9d75b34069a32d27fa27e71007f4874d15831f846877e3300f13d2ba75572e32943378567460665cdb6d08b38193f3c21fae18c6d5035
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.fmebfbbj.ofhbkjs/code_cache/secondary-dexes/base.apk.classes1.zip 3646 com.fmebfbbj.ofhbkjs [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.fmebfbbj.ofhbkjs/code_cache/secondary-dexes/base.apk.classes1.zip] 3646 com.fmebfbbj.ofhbkjs