Analysis
-
max time kernel
316753s -
max time network
158s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
23-09-2021 13:36
Static task
static1
Behavioral task
behavioral1
Sample
63952_Video_Oynatıcı.apk
Resource
android-x64-arm64
android_x64
0 signatures
0 seconds
General
-
Target
63952_Video_Oynatıcı.apk
-
Size
4.1MB
-
MD5
2b241471796b58c106b033ef9b72bcaf
-
SHA1
cb63f34668ed504d69a0a6522a3a50a440ad3517
-
SHA256
dd2346922c42bb9dd6c76c03b4b965a6c001baf8d799437035202cf336a0521a
-
SHA512
1a368ac6b4233c8310efca34033ad7a4d6b8e7c5466049fb54ce4a9a859f30b4a27c3ac5930afb51efc6007c6bae2381179e20f4a465d33ef5848a7bc3b9a863
Score
10/10
Malware Config
Extracted
Family
hydra
C2
http://lolamaefarmer5823.online
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.bylygdrf.dkfkvgs/zutcrolcbi/rkfpszwxttemdre/base.apk.aaxgwul1.sab 4220 com.bylygdrf.dkfkvgs -
Reads name of network operator 1 IoCs
Uses Android APIs to discover system information.
description ioc Process Framework API call android.telephony.TelephonyManager.getNetworkOperatorName com.bylygdrf.dkfkvgs -
Uses reflection 3 IoCs
description pid Process Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE 4220 com.bylygdrf.dkfkvgs Acesses field javax.security.auth.x500.X500Principal.thisX500Name 4220 com.bylygdrf.dkfkvgs Acesses field javax.security.auth.x500.X500Principal.thisX500Name 4220 com.bylygdrf.dkfkvgs