Analysis

  • max time kernel
    1963072s
  • max time network
    20s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    12-10-2021 14:57

General

  • Target

    29713_Video_Oynatıcı.apk

  • Size

    8.4MB

  • MD5

    ad53ff0a6090ab4904bc589ebbf64bb0

  • SHA1

    4caa507ad88af628be9d5e53a4dcbfba34c4351e

  • SHA256

    3154684c4192a1ae7a00f9f61d3024e2d25a85508c512094a771f878c3130848

  • SHA512

    df103e1d1ba138b6a87dd4c10c9de954db2732627d32ff3cbb821ee87cbfcbbc52b3123070bd3304f6f595f064fb28b581694788191ff6ec8371e11be40067b3

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.vsmucodt.bhvxnft
    1⤵
    • Loads dropped Dex/Jar
    PID:3607

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads