Analysis
-
max time kernel
1963072s -
max time network
20s -
platform
android_x64 -
resource
android-x64 -
submitted
12-10-2021 14:57
Static task
static1
Behavioral task
behavioral1
Sample
29713_Video_Oynatıcı.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
General
-
Target
29713_Video_Oynatıcı.apk
-
Size
8.4MB
-
MD5
ad53ff0a6090ab4904bc589ebbf64bb0
-
SHA1
4caa507ad88af628be9d5e53a4dcbfba34c4351e
-
SHA256
3154684c4192a1ae7a00f9f61d3024e2d25a85508c512094a771f878c3130848
-
SHA512
df103e1d1ba138b6a87dd4c10c9de954db2732627d32ff3cbb821ee87cbfcbbc52b3123070bd3304f6f595f064fb28b581694788191ff6ec8371e11be40067b3
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.vsmucodt.bhvxnft/gmajmdghbe/fjfhhfzvhyyqggb/base.apk.hgynibx1.xhg 3607 com.vsmucodt.bhvxnft [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.vsmucodt.bhvxnft/gmajmdghbe/fjfhhfzvhyyqggb/base.apk.hgynibx1.xhg] 3607 com.vsmucodt.bhvxnft