Analysis

  • max time kernel
    1635384s
  • max time network
    24s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    08-10-2021 19:55

General

  • Target

    FlashPlayerV3.5H.apk

  • Size

    7.6MB

  • MD5

    c5b7c26908f2069f775ef59d04c460f2

  • SHA1

    e01147ac429637654d6b3ced4bd7fa2eb6cb99d2

  • SHA256

    68c8de92c6bec2b88bdebe2a24362b8a3c1d77ba6d64f2ec92164d38e786ffbe

  • SHA512

    ef082d4663c382994af5d24113d56fef4b07a8f3319d3c6f9e9f68c2954b31c34f2510c1ea6215196b98d3f29496611f19ddcf45974a374fb359eb6218c00fce

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.agiqihvf.elievco
    1⤵
    • Loads dropped Dex/Jar
    PID:3606

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads