Analysis

  • max time kernel
    216882s
  • platform
    android_x86
  • resource
    android-x86-arm
  • submitted
    22/09/2021, 09:51

General

  • Target

    b087415d28ceddcba34be7cdb3dbced6a11ac15a6f818a45d38bc35402a9cd81.apk

  • Size

    7.5MB

  • MD5

    827b994a520602e2fa9065b36b1bbfe6

  • SHA1

    10cf183b4dd3dc32c4dd151e6b4ef6bcf02ff9c3

  • SHA256

    b087415d28ceddcba34be7cdb3dbced6a11ac15a6f818a45d38bc35402a9cd81

  • SHA512

    a83fe14ccd043319ff545db80df6fc2309644c0566345508e024b0b939ec906ff53dd3ccee82150c7c7b5dd0fcb15c8a792cc1a26c36b5f76e1e0cc2f5e54135

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests enabling of the accessibility settings. 1 IoCs

Processes

  • com.bopgvbgn.havzjqp
    1⤵
    • Loads dropped Dex/Jar
    • Requests enabling of the accessibility settings.
    PID:4918
    • com.bopgvbgn.havzjqp
      2⤵
        PID:4949
      • /system/bin/dex2oat
        2⤵
        • Loads dropped Dex/Jar
        PID:4949
      • com.bopgvbgn.havzjqp
        2⤵
          PID:5095

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads