Analysis

  • max time kernel
    1353722s
  • max time network
    29s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    05-10-2021 13:41

General

  • Target

    commerzbank.apk

  • Size

    8.8MB

  • MD5

    c820b0067bb90bebed17a402715d06eb

  • SHA1

    1838e61f495471f6aa23c293bccd4e715d788b0b

  • SHA256

    9a0339b27486cc1ab1bd76949e813a9a76df0226f8fdc5742e05f5008a597d10

  • SHA512

    914abcd295550de3487835e40cc16c85da94487bcc677aba19e5a71a2c8d12252928c50407c48f0a2470f2ed088e108c64b0a4649477ff59cc1027e8df9b99b8

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.pmngescl.jmkazkw
    1⤵
    • Loads dropped Dex/Jar
    PID:3663

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads