Analysis
-
max time kernel
216800s -
max time network
123s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
22-09-2021 09:50
Static task
static1
Behavioral task
behavioral1
Sample
721cf0dd987f57c4aca4690c8d1030a84dda751676d3842ff4f2543939a52029.apk
Resource
android-x64-arm64
0 signatures
0 seconds
General
-
Target
721cf0dd987f57c4aca4690c8d1030a84dda751676d3842ff4f2543939a52029.apk
-
Size
7.5MB
-
MD5
f5e0177cfdf7967f1f4f08f982fd0c95
-
SHA1
9089272032b8d7ca33615200cc71405ca477c9d4
-
SHA256
721cf0dd987f57c4aca4690c8d1030a84dda751676d3842ff4f2543939a52029
-
SHA512
1ad5a55ec288aa541d83e98fb3ab641bab5511a51e08056994b87d60570ca78c649fcd4e84fd508e5f756f531e38e305b9503c19b97417023dfa8b197e9aab2c
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mrbkvzda.ywrbihf/code_cache/secondary-dexes/base.apk.classes1.zip 4373 com.mrbkvzda.ywrbihf [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.mrbkvzda.ywrbihf/code_cache/secondary-dexes/base.apk.classes1.zip] 4373 com.mrbkvzda.ywrbihf -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.mrbkvzda.ywrbihf