Analysis

  • max time kernel
    930915s
  • max time network
    29s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    30-09-2021 16:12

General

  • Target

    560bc78d6e227e068e99ca04beeac070e97a46d2792ef7b4292a4f125a516e53.apk

  • Size

    8.4MB

  • MD5

    d060d2907ffde97e9bc6d4eb83974dae

  • SHA1

    9682f31628e832b074509b1482fefce50d0ea532

  • SHA256

    560bc78d6e227e068e99ca04beeac070e97a46d2792ef7b4292a4f125a516e53

  • SHA512

    caf096fe947b300f6a6e06d19d54f53148ab057bb01298381016deeac56f1ba6b2f0e04f1b1e86cba9b53c9cbf32aab3a87caf0450c0a26c07d956c730156bca

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.gkgtfkmf.qbvjyix
    1⤵
    • Loads dropped Dex/Jar
    PID:3688

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads