Analysis

  • max time kernel
    216800s
  • max time network
    123s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    22-09-2021 09:50

General

  • Target

    721cf0dd987f57c4aca4690c8d1030a84dda751676d3842ff4f2543939a52029.apk

  • Size

    7.5MB

  • MD5

    f5e0177cfdf7967f1f4f08f982fd0c95

  • SHA1

    9089272032b8d7ca33615200cc71405ca477c9d4

  • SHA256

    721cf0dd987f57c4aca4690c8d1030a84dda751676d3842ff4f2543939a52029

  • SHA512

    1ad5a55ec288aa541d83e98fb3ab641bab5511a51e08056994b87d60570ca78c649fcd4e84fd508e5f756f531e38e305b9503c19b97417023dfa8b197e9aab2c

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests enabling of the accessibility settings. 1 IoCs

Processes

  • com.mrbkvzda.ywrbihf
    1⤵
    • Loads dropped Dex/Jar
    • Requests enabling of the accessibility settings.
    PID:4373

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads