Analysis
-
max time kernel
930915s -
max time network
29s -
platform
android_x64 -
resource
android-x64 -
submitted
30-09-2021 16:12
Static task
static1
Behavioral task
behavioral1
Sample
560bc78d6e227e068e99ca04beeac070e97a46d2792ef7b4292a4f125a516e53.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
General
-
Target
560bc78d6e227e068e99ca04beeac070e97a46d2792ef7b4292a4f125a516e53.apk
-
Size
8.4MB
-
MD5
d060d2907ffde97e9bc6d4eb83974dae
-
SHA1
9682f31628e832b074509b1482fefce50d0ea532
-
SHA256
560bc78d6e227e068e99ca04beeac070e97a46d2792ef7b4292a4f125a516e53
-
SHA512
caf096fe947b300f6a6e06d19d54f53148ab057bb01298381016deeac56f1ba6b2f0e04f1b1e86cba9b53c9cbf32aab3a87caf0450c0a26c07d956c730156bca
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.gkgtfkmf.qbvjyix/vqgojcuoge/tigxksumjucnbls/base.apk.miqtfrj1.qth 3688 com.gkgtfkmf.qbvjyix [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.gkgtfkmf.qbvjyix/vqgojcuoge/tigxksumjucnbls/base.apk.miqtfrj1.qth] 3688 com.gkgtfkmf.qbvjyix