Analysis

  • max time kernel
    1589337s
  • max time network
    25s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    08-10-2021 07:08

General

  • Target

    download1.php.apk

  • Size

    8.6MB

  • MD5

    eb23552291fd4e500782677836a0fef8

  • SHA1

    ccdd2908ed405afca7f6c80352d3b12d6dfc5d73

  • SHA256

    8729cde8ad57b1764b18b2e3d62ff8d9c1b38b651f1e7328fd65b839d4f48a72

  • SHA512

    db34ffd90a4069748a707b08e1084863d29a79551f167dccdaf23f50fd42b1fe28a1da2a825e53b82de214718c877349b26d3d4e5648645d9476f0875f33461f

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.pmbnqwkd.bpomxye
    1⤵
    • Loads dropped Dex/Jar
    PID:3627

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads