Analysis

  • max time kernel
    860043s
  • max time network
    193s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    18-11-2021 13:36

General

  • Target

    psk.apk

  • Size

    8.6MB

  • MD5

    4076db4387eb8ddf8f2010e3db8c8b07

  • SHA1

    3555274dae63d29a66a68211ba6244b34ccab1c4

  • SHA256

    fe9cfc5046c583a7b28fa506cd33e636d27310b14240247625c693444a27336f

  • SHA512

    a98825781c40ea2bb99e337d349bc6b2b935d9f81837558a96ad2f622da92e79302c4c16715eee6acf6de2862716cbe5fd57323a231dc98c191450a17827eea3

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra Payload 2 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.mimic.left
    1⤵
    • Loads dropped Dex/Jar
    PID:4394

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads