Analysis

  • max time kernel
    2004417s
  • max time network
    19s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    13-10-2021 02:26

General

  • Target

    84563_Video_Oynatıcı.apk

  • Size

    8.4MB

  • MD5

    edc5eeb1f0ff10f5e2506d9d032a8d67

  • SHA1

    d0bdb0b5d99286cef289d87e6fdf281493f34898

  • SHA256

    faaf963fd84d0e7c86f8750115f5291f0692d0aca0f97e151cf4cc870a65d88e

  • SHA512

    afd953d97d3ec0b1baaa34dd003a29340e3828d4a6d7ea1261079e7f049af5f5bc75a5ce0c4f441be5bf801cdf03f0fbfcb5913822c92ae14de413c2c88b9c39

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.bfyjyhdj.fdmomgg
    1⤵
    • Loads dropped Dex/Jar
    PID:3604

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads