Analysis

  • max time kernel
    1271109s
  • platform
    android_x86
  • resource
    android-x86-arm
  • submitted
    04-10-2021 14:41

General

  • Target

    1d03e9b69f64f8f4be3559a3e3f3b3ff04426d18c48adb213960da8c5f98b741.apk

  • Size

    5.4MB

  • MD5

    7ff0122bb9ff26c4547b00fb21859995

  • SHA1

    fa29838cbacb2104da9d85b5cd9be1e660389e75

  • SHA256

    1d03e9b69f64f8f4be3559a3e3f3b3ff04426d18c48adb213960da8c5f98b741

  • SHA512

    aa70fc0edfa3d38e48a44bd9075d9893a8d5a71cdd9dca61abeb97cdeccbc68e408a95844b941795fab18b327f07dce34f9ec3334bc126041096fdc8b63f8c01

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra Payload 1 IoCs
  • Loads dropped Dex/Jar 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests enabling of the accessibility settings. 1 IoCs
  • Uses reflection 1 IoCs

Processes

  • soon.dirt.into
    1⤵
    • Loads dropped Dex/Jar
    • Requests enabling of the accessibility settings.
    • Uses reflection
    PID:5033
    • soon.dirt.into
      2⤵
        PID:5062
      • /system/bin/dex2oat
        2⤵
        • Loads dropped Dex/Jar
        PID:5062

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads