Analysis

  • max time kernel
    316753s
  • max time network
    158s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    23-09-2021 13:36

General

  • Target

    63952_Video_Oynatıcı.apk

  • Size

    4.1MB

  • MD5

    2b241471796b58c106b033ef9b72bcaf

  • SHA1

    cb63f34668ed504d69a0a6522a3a50a440ad3517

  • SHA256

    dd2346922c42bb9dd6c76c03b4b965a6c001baf8d799437035202cf336a0521a

  • SHA512

    1a368ac6b4233c8310efca34033ad7a4d6b8e7c5466049fb54ce4a9a859f30b4a27c3ac5930afb51efc6007c6bae2381179e20f4a465d33ef5848a7bc3b9a863

Malware Config

Extracted

Family

hydra

C2

http://lolamaefarmer5823.online

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads name of network operator 1 IoCs

    Uses Android APIs to discover system information.

  • Uses reflection 3 IoCs

Processes

  • com.bylygdrf.dkfkvgs
    1⤵
    • Loads dropped Dex/Jar
    • Reads name of network operator
    • Uses reflection
    PID:4220

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads