Analysis
-
max time kernel
1589337s -
max time network
25s -
platform
android_x64 -
resource
android-x64 -
submitted
08-10-2021 07:08
Static task
static1
Behavioral task
behavioral1
Sample
download1.php.apk
Resource
android-x64
0 signatures
0 seconds
General
-
Target
download1.php.apk
-
Size
8.6MB
-
MD5
eb23552291fd4e500782677836a0fef8
-
SHA1
ccdd2908ed405afca7f6c80352d3b12d6dfc5d73
-
SHA256
8729cde8ad57b1764b18b2e3d62ff8d9c1b38b651f1e7328fd65b839d4f48a72
-
SHA512
db34ffd90a4069748a707b08e1084863d29a79551f167dccdaf23f50fd42b1fe28a1da2a825e53b82de214718c877349b26d3d4e5648645d9476f0875f33461f
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.pmbnqwkd.bpomxye/hzzfsp8izw/huwpcnfoixfxunf/base.apk.jvfjmua1.jiu 3627 com.pmbnqwkd.bpomxye [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.pmbnqwkd.bpomxye/hzzfsp8izw/huwpcnfoixfxunf/base.apk.jvfjmua1.jiu] 3627 com.pmbnqwkd.bpomxye