Analysis
-
max time kernel
1865094s -
max time network
19s -
platform
android_x64 -
resource
android-x64 -
submitted
11-10-2021 11:44
Static task
static1
Behavioral task
behavioral1
Sample
03571_Video_Oynatıcı.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
General
-
Target
03571_Video_Oynatıcı.apk
-
Size
7.5MB
-
MD5
e02ce289c41cad7d6dfbecd2fe987d53
-
SHA1
6b697f6cc73d18cef4e6d4818ccc68820922a951
-
SHA256
13385204843fdbcd2ab3d7d6b55797bf2782740c76d61530c8a0b0a67bb01957
-
SHA512
858559a1b1e8dcb605f69b5cc4885ff66853269f56de79bd3087984e13259436f17ace66349ccd1280db4e236558e7d9bfa898f6f90a3ef746d2a25517aea6e0
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.onoyabrc.kobbzqg/Injbnojkgu/cjbbhhnwjlfitps/base.apk.bflbbbf1.fhj 3616 com.onoyabrc.kobbzqg [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.onoyabrc.kobbzqg/Injbnojkgu/cjbbhhnwjlfitps/base.apk.bflbbbf1.fhj] 3616 com.onoyabrc.kobbzqg