Analysis
-
max time kernel
5365s -
platform
android_x64 -
resource
android-x64 -
submitted
08-11-2021 16:09
Static task
static1
Behavioral task
behavioral1
Sample
3f46243d7d6873d6605fe0123ccf298e422e756ad2550ed0f3cecfedd89bd1a9.apk
Resource
android-x64
0 signatures
0 seconds
General
-
Target
3f46243d7d6873d6605fe0123ccf298e422e756ad2550ed0f3cecfedd89bd1a9.apk
-
Size
8.9MB
-
MD5
996cec48d6c948a2c7397e5e01e5b9f5
-
SHA1
775646984ffe9c5f6854f6d4822599bbe354dae0
-
SHA256
3f46243d7d6873d6605fe0123ccf298e422e756ad2550ed0f3cecfedd89bd1a9
-
SHA512
13424a095528ef047a0cf638c7bb97b9555601cc7610b9fd84464a6fd25f43e6f16a13c044a3490e713c9c5980a6d64a466789c54ad63d7e9ae42024ee1e321a
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mogitbdy.xgtadhfe/cugptyUfTl/ngYvFlFUUgFkGYo/base.apk.hticuad1.tug 3612 com.mogitbdy.xgtadhfe