Analysis
-
max time kernel
1906620s -
max time network
19s -
platform
android_x64 -
resource
android-x64 -
submitted
11-10-2021 23:13
Static task
static1
Behavioral task
behavioral1
Sample
61305_Video_Oynatıcı.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
General
-
Target
61305_Video_Oynatıcı.apk
-
Size
7.5MB
-
MD5
e1faee56c0a0fbe2a7ecc47d8c7ffc6c
-
SHA1
86a4db73852dd8f6dc2794cca257d197fa99c4b9
-
SHA256
d190fd3c695e2ca36235832834912ed02f3d64038600d525991c8024c6196839
-
SHA512
fb809f44f516240b565ed7e34df401748b7a89211918215d58aad519f7a6a65066ae4b7177dec8292d805c7c87ce45a68b878cbd5b56c5f5d6efb56dc2d5f00a
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ecgtbxfo.pqgkivp/dfnjUyubgb/nxnxJxjuxkgbokI/base.apk.bJ8w8js1.zgs 3618 com.ecgtbxfo.pqgkivp [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.ecgtbxfo.pqgkivp/dfnjUyubgb/nxnxJxjuxkgbokI/base.apk.bJ8w8js1.zgs] 3618 com.ecgtbxfo.pqgkivp