Analysis
-
max time kernel
216882s -
platform
android_x86 -
resource
android-x86-arm -
submitted
22/09/2021, 09:51 UTC
Static task
static1
Behavioral task
behavioral1
Sample
b087415d28ceddcba34be7cdb3dbced6a11ac15a6f818a45d38bc35402a9cd81.apk
Resource
android-x86-arm
0 signatures
0 seconds
General
-
Target
b087415d28ceddcba34be7cdb3dbced6a11ac15a6f818a45d38bc35402a9cd81.apk
-
Size
7.5MB
-
MD5
827b994a520602e2fa9065b36b1bbfe6
-
SHA1
10cf183b4dd3dc32c4dd151e6b4ef6bcf02ff9c3
-
SHA256
b087415d28ceddcba34be7cdb3dbced6a11ac15a6f818a45d38bc35402a9cd81
-
SHA512
a83fe14ccd043319ff545db80df6fc2309644c0566345508e024b0b939ec906ff53dd3ccee82150c7c7b5dd0fcb15c8a792cc1a26c36b5f76e1e0cc2f5e54135
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.bopgvbgn.havzjqp/code_cache/secondary-dexes/base.apk.classes1.zip 4949 /system/bin/dex2oat /data/user/0/com.bopgvbgn.havzjqp/code_cache/secondary-dexes/base.apk.classes1.zip 4918 com.bopgvbgn.havzjqp -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.bopgvbgn.havzjqp