Analysis

  • max time kernel
    1740771s
  • max time network
    20s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    10-10-2021 01:12

General

  • Target

    02513_Video_Oynatıcı.apk

  • Size

    7.5MB

  • MD5

    bbdfddc05f32e4d7421e7b29dc2c2d48

  • SHA1

    c10f45072242b16735dce7bc08b15bce72b6522a

  • SHA256

    ea391f65ae367799ab1bc162a4b8dcedb76f1da1e5595548497d943298f18682

  • SHA512

    8442866d0ba9652549883648f9e1e22d7980f2f43494fd72789934a9138fcc97ff67f3ee73288e9601597c4e5a7ecb1179c4f7acb70284aa96793383fc5fc763

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.nhpbwede.sandbga
    1⤵
    • Loads dropped Dex/Jar
    PID:3623

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads