Analysis

  • max time kernel
    216882s
  • platform
    android_x86
  • resource
    android-x86-arm
  • submitted
    22/09/2021, 09:51 UTC

General

  • Target

    b087415d28ceddcba34be7cdb3dbced6a11ac15a6f818a45d38bc35402a9cd81.apk

  • Size

    7.5MB

  • MD5

    827b994a520602e2fa9065b36b1bbfe6

  • SHA1

    10cf183b4dd3dc32c4dd151e6b4ef6bcf02ff9c3

  • SHA256

    b087415d28ceddcba34be7cdb3dbced6a11ac15a6f818a45d38bc35402a9cd81

  • SHA512

    a83fe14ccd043319ff545db80df6fc2309644c0566345508e024b0b939ec906ff53dd3ccee82150c7c7b5dd0fcb15c8a792cc1a26c36b5f76e1e0cc2f5e54135

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests enabling of the accessibility settings. 1 IoCs

Processes

  • com.bopgvbgn.havzjqp
    1⤵
    • Loads dropped Dex/Jar
    • Requests enabling of the accessibility settings.
    PID:4918
    • com.bopgvbgn.havzjqp
      2⤵
        PID:4949
      • /system/bin/dex2oat
        2⤵
        • Loads dropped Dex/Jar
        PID:4949
      • com.bopgvbgn.havzjqp
        2⤵
          PID:5095

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.