Analysis
-
max time kernel
921867s -
platform
android_x86 -
resource
android-x86-arm -
submitted
30-09-2021 13:41
Static task
static1
Behavioral task
behavioral1
Sample
db.apk
Resource
android-x86-arm
0 signatures
0 seconds
General
-
Target
db.apk
-
Size
8.4MB
-
MD5
d060d2907ffde97e9bc6d4eb83974dae
-
SHA1
9682f31628e832b074509b1482fefce50d0ea532
-
SHA256
560bc78d6e227e068e99ca04beeac070e97a46d2792ef7b4292a4f125a516e53
-
SHA512
caf096fe947b300f6a6e06d19d54f53148ab057bb01298381016deeac56f1ba6b2f0e04f1b1e86cba9b53c9cbf32aab3a87caf0450c0a26c07d956c730156bca
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.gkgtfkmf.qbvjyix/vqgojcuoge/tigxksumjucnbls/base.apk.miqtfrj1.qth 5009 /system/bin/dex2oat /data/user/0/com.gkgtfkmf.qbvjyix/vqgojcuoge/tigxksumjucnbls/base.apk.miqtfrj1.qth 4981 com.gkgtfkmf.qbvjyix