Analysis

  • max time kernel
    289769s
  • max time network
    69s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    11-11-2021 23:11

General

  • Target

    155e5be1a29269f7016f9dbb1a6f62f0.apk

  • Size

    9.0MB

  • MD5

    155e5be1a29269f7016f9dbb1a6f62f0

  • SHA1

    81a8c8fe26f5607c3aec21592ddb866460467104

  • SHA256

    0d9df9ccb56f5fc3c7149704fe648ad6d3666c1da3413dfba3cf4b11cbb5f9be

  • SHA512

    cf0932b7bd4f2ebe9ce07ce6f2f051b40b50103b752d2c098ceb6fadad505c251b58ef574393e8dec8d99304ddeeda0cf92704408fc1e0491fe116d2f72d32ea

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.otszfjap.xsvaxtc
    1⤵
    • Loads dropped Dex/Jar
    PID:3646

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads