Analysis
-
max time kernel
860043s -
max time network
193s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
18-11-2021 13:36
Static task
static1
Behavioral task
behavioral1
Sample
psk.apk
Resource
android-x64-arm64
0 signatures
0 seconds
General
-
Target
psk.apk
-
Size
8.6MB
-
MD5
4076db4387eb8ddf8f2010e3db8c8b07
-
SHA1
3555274dae63d29a66a68211ba6244b34ccab1c4
-
SHA256
fe9cfc5046c583a7b28fa506cd33e636d27310b14240247625c693444a27336f
-
SHA512
a98825781c40ea2bb99e337d349bc6b2b935d9f81837558a96ad2f622da92e79302c4c16715eee6acf6de2862716cbe5fd57323a231dc98c191450a17827eea3
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra Payload 2 IoCs
resource yara_rule behavioral1/memory/4394-0.dex family_hydra behavioral1/memory/4394-1.dex family_hydra -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mimic.left/app_DynamicOptDex/HguQ.json 4394 com.mimic.left /data/user/0/com.mimic.left/app_DynamicOptDex/HguQ.json 4394 com.mimic.left