Analysis
-
max time kernel
1635384s -
max time network
24s -
platform
android_x64 -
resource
android-x64 -
submitted
08-10-2021 19:55
Static task
static1
Behavioral task
behavioral1
Sample
FlashPlayerV3.5H.apk
Resource
android-x64
0 signatures
0 seconds
General
-
Target
FlashPlayerV3.5H.apk
-
Size
7.6MB
-
MD5
c5b7c26908f2069f775ef59d04c460f2
-
SHA1
e01147ac429637654d6b3ced4bd7fa2eb6cb99d2
-
SHA256
68c8de92c6bec2b88bdebe2a24362b8a3c1d77ba6d64f2ec92164d38e786ffbe
-
SHA512
ef082d4663c382994af5d24113d56fef4b07a8f3319d3c6f9e9f68c2954b31c34f2510c1ea6215196b98d3f29496611f19ddcf45974a374fb359eb6218c00fce
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.agiqihvf.elievco/gjaegy8gur/zofhghvtebgywry/base.apk.dkg8fld1.z8g 3606 com.agiqihvf.elievco [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.agiqihvf.elievco/gjaegy8gur/zofhghvtebgywry/base.apk.dkg8fld1.z8g] 3606 com.agiqihvf.elievco