Analysis

  • max time kernel
    995413s
  • max time network
    21s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    01/10/2021, 10:09 UTC

General

  • Target

    db.apk

  • Size

    8.4MB

  • MD5

    3485b084ca43e53fab17fd5825796c93

  • SHA1

    a0ba124f9bf287469b0cffe679648924c57754b9

  • SHA256

    f489e424d946083b0167321ea10fa87b48f05e85386609e810bbf6e4778efd6f

  • SHA512

    a107296bec24a62138349830056a8864cacc6768e03e02c034cf5c4b56866058fe4a5bb028a8e02bee15de87131e828d1cd7de477f6a420105234459b5c46a27

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.hygvjlea.kcitrhb
    1⤵
    • Loads dropped Dex/Jar
    PID:3604

Network

    No results found
  • 1.1.1.1:853
    tls
    848 B
    3.4kB
    12
    8
  • 216.239.35.12:123
    time.android.com
    ntp
    76 B
    76 B
    1
    1

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.