Analysis
-
max time kernel
1589594s -
platform
android_x86 -
resource
android-x86-arm -
submitted
08-10-2021 07:10
Static task
static1
Behavioral task
behavioral1
Sample
santander.apk
Resource
android-x86-arm
android_x86
0 signatures
0 seconds
General
-
Target
santander.apk
-
Size
8.6MB
-
MD5
984d3c66b88d5cc3bab7fd57a7da2ab1
-
SHA1
27313e8f593ec89ff27006161873c06d554fd438
-
SHA256
1c279ba2eb463c0c09223142f4a3502db314d3c1b07638d68c10ffd02bc45633
-
SHA512
a17dfbe8a00931b4caf19451f1f15ed73fa070cbf86df0986bab807eddfa6f1aa8c243ab048ada1298582a47329edc6b7829e6c85ce4b178152ce363c9197b70
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.msfqektl.arufgjt/uJfkachijt/yjUbjukJoovfwaj/base.apk.djkkhhu1.ukf 4920 /system/bin/dex2oat /data/user/0/com.msfqektl.arufgjt/uJfkachijt/yjUbjukJoovfwaj/base.apk.djkkhhu1.ukf 4886 com.msfqektl.arufgjt