Analysis
-
max time kernel
2004417s -
max time network
19s -
platform
android_x64 -
resource
android-x64 -
submitted
13-10-2021 02:26
Static task
static1
Behavioral task
behavioral1
Sample
84563_Video_Oynatıcı.apk
Resource
android-x64
0 signatures
0 seconds
General
-
Target
84563_Video_Oynatıcı.apk
-
Size
8.4MB
-
MD5
edc5eeb1f0ff10f5e2506d9d032a8d67
-
SHA1
d0bdb0b5d99286cef289d87e6fdf281493f34898
-
SHA256
faaf963fd84d0e7c86f8750115f5291f0692d0aca0f97e151cf4cc870a65d88e
-
SHA512
afd953d97d3ec0b1baaa34dd003a29340e3828d4a6d7ea1261079e7f049af5f5bc75a5ce0c4f441be5bf801cdf03f0fbfcb5913822c92ae14de413c2c88b9c39
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.bfyjyhdj.fdmomgg/ok8vhncfky/jiofydgdtjktbqx/base.apk.8mjqgfj1.tlp 3604 com.bfyjyhdj.fdmomgg [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.bfyjyhdj.fdmomgg/ok8vhncfky/jiofydgdtjktbqx/base.apk.8mjqgfj1.tlp] 3604 com.bfyjyhdj.fdmomgg