Analysis

  • max time kernel
    896592s
  • max time network
    158s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    30-09-2021 06:40

General

  • Target

    26574_Video_Oynatıcı.apk

  • Size

    3.8MB

  • MD5

    5cb878467cbb030bbaf09c6f6ab524f4

  • SHA1

    383e2f00b78eee433a9e8a2a3273e2fc15e52cfc

  • SHA256

    20c9ada9d408cd2a2e8202574deb7e0ceb04b9366884a4364c1ab8197d91748e

  • SHA512

    898058050b56d99cf22170c0fd7e5a142a7f3304da40fda1d3bd130b6672d0d3dd51448a29ea6e49218b083ee01f88134b8f9816411bdf774c1724f830096192

Malware Config

Extracted

Family

hydra

C2

http://lolamaefarmer5823.online

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads name of network operator 1 IoCs

    Uses Android APIs to discover system information.

  • Uses reflection 3 IoCs

Processes

  • com.hagehdqn.jkldglx
    1⤵
    • Loads dropped Dex/Jar
    • Reads name of network operator
    • Uses reflection
    PID:3725

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads