Analysis

  • max time kernel
    124028s
  • max time network
    26s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    21-09-2021 08:06

General

  • Target

    commerzbank.apk

  • Size

    7.8MB

  • MD5

    c47cdae511e1dad0328abdfdbe60bdc3

  • SHA1

    cd9c039963cc6ad28677041d5096fc6098cd6e27

  • SHA256

    54318a908bc0d347fb56fe48ff7ca7e16fe5eec1d69e7248c902eac0edd45a5b

  • SHA512

    31211f2a1aab4552bbf28c9fdbc9f051ab2eebdbdde05cfaf7bca1dafeb8eb54939523507776399257f31fcf8dcc219510fa9a5d47f867b88ff35e85558561c8

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.gzjgyfds.owzgxab
    1⤵
    • Loads dropped Dex/Jar
    PID:3675

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads