Analysis

  • max time kernel
    5365s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    08-11-2021 16:09

General

  • Target

    3f46243d7d6873d6605fe0123ccf298e422e756ad2550ed0f3cecfedd89bd1a9.apk

  • Size

    8.9MB

  • MD5

    996cec48d6c948a2c7397e5e01e5b9f5

  • SHA1

    775646984ffe9c5f6854f6d4822599bbe354dae0

  • SHA256

    3f46243d7d6873d6605fe0123ccf298e422e756ad2550ed0f3cecfedd89bd1a9

  • SHA512

    13424a095528ef047a0cf638c7bb97b9555601cc7610b9fd84464a6fd25f43e6f16a13c044a3490e713c9c5980a6d64a466789c54ad63d7e9ae42024ee1e321a

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.mogitbdy.xgtadhfe
    1⤵
    • Loads dropped Dex/Jar
    PID:3612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads