Analysis

  • max time kernel
    921867s
  • platform
    android_x86
  • resource
    android-x86-arm
  • submitted
    30-09-2021 13:41

General

  • Target

    db.apk

  • Size

    8.4MB

  • MD5

    d060d2907ffde97e9bc6d4eb83974dae

  • SHA1

    9682f31628e832b074509b1482fefce50d0ea532

  • SHA256

    560bc78d6e227e068e99ca04beeac070e97a46d2792ef7b4292a4f125a516e53

  • SHA512

    caf096fe947b300f6a6e06d19d54f53148ab057bb01298381016deeac56f1ba6b2f0e04f1b1e86cba9b53c9cbf32aab3a87caf0450c0a26c07d956c730156bca

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.gkgtfkmf.qbvjyix
    1⤵
    • Loads dropped Dex/Jar
    PID:4981
    • com.gkgtfkmf.qbvjyix
      2⤵
        PID:5009
      • /system/bin/dex2oat
        2⤵
        • Loads dropped Dex/Jar
        PID:5009
      • com.gkgtfkmf.qbvjyix
        2⤵
          PID:5143

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads