Analysis
-
max time kernel
1740771s -
max time network
20s -
platform
android_x64 -
resource
android-x64 -
submitted
10-10-2021 01:12
Static task
static1
Behavioral task
behavioral1
Sample
02513_Video_Oynatıcı.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
General
-
Target
02513_Video_Oynatıcı.apk
-
Size
7.5MB
-
MD5
bbdfddc05f32e4d7421e7b29dc2c2d48
-
SHA1
c10f45072242b16735dce7bc08b15bce72b6522a
-
SHA256
ea391f65ae367799ab1bc162a4b8dcedb76f1da1e5595548497d943298f18682
-
SHA512
8442866d0ba9652549883648f9e1e22d7980f2f43494fd72789934a9138fcc97ff67f3ee73288e9601597c4e5a7ecb1179c4f7acb70284aa96793383fc5fc763
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.nhpbwede.sandbga/jh8ptpwgbJ/jcblhnvfUkbbuva/base.apk.ckIkjit1.kaz 3623 com.nhpbwede.sandbga [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.nhpbwede.sandbga/jh8ptpwgbJ/jcblhnvfUkbbuva/base.apk.ckIkjit1.kaz] 3623 com.nhpbwede.sandbga