Analysis

  • max time kernel
    1589594s
  • platform
    android_x86
  • resource
    android-x86-arm
  • submitted
    08-10-2021 07:10

General

  • Target

    santander.apk

  • Size

    8.6MB

  • MD5

    984d3c66b88d5cc3bab7fd57a7da2ab1

  • SHA1

    27313e8f593ec89ff27006161873c06d554fd438

  • SHA256

    1c279ba2eb463c0c09223142f4a3502db314d3c1b07638d68c10ffd02bc45633

  • SHA512

    a17dfbe8a00931b4caf19451f1f15ed73fa070cbf86df0986bab807eddfa6f1aa8c243ab048ada1298582a47329edc6b7829e6c85ce4b178152ce363c9197b70

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.msfqektl.arufgjt
    1⤵
    • Loads dropped Dex/Jar
    PID:4886
    • com.msfqektl.arufgjt
      2⤵
        PID:4920
      • /system/bin/dex2oat
        2⤵
        • Loads dropped Dex/Jar
        PID:4920
      • com.msfqektl.arufgjt
        2⤵
          PID:5084

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads