Analysis
-
max time kernel
2152156s -
max time network
61s -
platform
android_x64 -
resource
android-x64 -
submitted
14-10-2021 19:27
Static task
static1
Behavioral task
behavioral1
Sample
FlashPlayerV3.8.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
General
-
Target
FlashPlayerV3.8.apk
-
Size
7.6MB
-
MD5
2e342b396f42b80a7e9c148904e73959
-
SHA1
10388c6b404fdbd652239e1964c4841ee0ad3bae
-
SHA256
d00dc910e6f8ea1ba46d4af40d428562cd8563222db4fc0a60fe5bb1fae322fe
-
SHA512
18639bda61af40087dc3dc35a75d2d21857ef429827e2005c501e24b3eac028f4c6e12f74e196cb66ef82c8e0808bfe91f741c6f8611181bc4ff2a306a978665
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ymthgdao.gebyzuv/twugeocaht/jokdktoxkwbjiqe/base.apk.uybvkrm1.syp 3712 com.ymthgdao.gebyzuv [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.ymthgdao.gebyzuv/twugeocaht/jokdktoxkwbjiqe/base.apk.uybvkrm1.syp] 3712 com.ymthgdao.gebyzuv