Analysis
-
max time kernel
289769s -
max time network
69s -
platform
android_x64 -
resource
android-x64 -
submitted
11-11-2021 23:11
Static task
static1
Behavioral task
behavioral1
Sample
155e5be1a29269f7016f9dbb1a6f62f0.apk
Resource
android-x64
0 signatures
0 seconds
General
-
Target
155e5be1a29269f7016f9dbb1a6f62f0.apk
-
Size
9.0MB
-
MD5
155e5be1a29269f7016f9dbb1a6f62f0
-
SHA1
81a8c8fe26f5607c3aec21592ddb866460467104
-
SHA256
0d9df9ccb56f5fc3c7149704fe648ad6d3666c1da3413dfba3cf4b11cbb5f9be
-
SHA512
cf0932b7bd4f2ebe9ce07ce6f2f051b40b50103b752d2c098ceb6fadad505c251b58ef574393e8dec8d99304ddeeda0cf92704408fc1e0491fe116d2f72d32ea
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.otszfjap.xsvaxtc/sYYGIfHh7G/BiHfyG8hdHUIIiy/base.apk.HOfBOBH1.IbI 3646 com.otszfjap.xsvaxtc