Analysis
-
max time kernel
1956195s -
max time network
49s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
12-10-2021 13:02
Static task
static1
Behavioral task
behavioral1
Sample
86470_Video_Oynatıcı.apk
Resource
android-x64-arm64
0 signatures
0 seconds
General
-
Target
86470_Video_Oynatıcı.apk
-
Size
8.4MB
-
MD5
e12cef406103cf0e9f23d0b9a32bda1d
-
SHA1
1f4bd5980d7af4665b5d75ce63637feac1da19fd
-
SHA256
49bca7195e05926210f7dffe4289f6b30372db9de7af72bc6a4802cb477e5729
-
SHA512
df51db7294111deb3f7daf9ff56572a86d11adbcedc690a9eed5cc2557f1350e9d6f34ef85c8e7f715a9357b8eec73494a1995730a5dfe84bbf91ce11fee77fa
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.uzqxadsb.wybaqvf/nyxmhugogc/ynhgxyqtvsssugk/base.apk.qjgeykf1.r88 4599 com.uzqxadsb.wybaqvf [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.uzqxadsb.wybaqvf/nyxmhugogc/ynhgxyqtvsssugk/base.apk.qjgeykf1.r88] 4599 com.uzqxadsb.wybaqvf