Analysis
-
max time kernel
124028s -
max time network
26s -
platform
android_x64 -
resource
android-x64 -
submitted
21-09-2021 08:06
Static task
static1
Behavioral task
behavioral1
Sample
commerzbank.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
General
-
Target
commerzbank.apk
-
Size
7.8MB
-
MD5
c47cdae511e1dad0328abdfdbe60bdc3
-
SHA1
cd9c039963cc6ad28677041d5096fc6098cd6e27
-
SHA256
54318a908bc0d347fb56fe48ff7ca7e16fe5eec1d69e7248c902eac0edd45a5b
-
SHA512
31211f2a1aab4552bbf28c9fdbc9f051ab2eebdbdde05cfaf7bca1dafeb8eb54939523507776399257f31fcf8dcc219510fa9a5d47f867b88ff35e85558561c8
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.gzjgyfds.owzgxab/reoudgggga/xmjhjmotgheoiub/base.apk.wmojstb1.arm 3675 com.gzjgyfds.owzgxab [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.gzjgyfds.owzgxab/reoudgggga/xmjhjmotgheoiub/base.apk.wmojstb1.arm] 3675 com.gzjgyfds.owzgxab