Analysis

  • max time kernel
    856400s
  • platform
    android_x86
  • resource
    android-x86-arm
  • submitted
    18-11-2021 13:35

General

  • Target

    db.apk

  • Size

    9.2MB

  • MD5

    62f500d8d63a71a821f9de8932101be7

  • SHA1

    219008f34810ef684dbe0f3700fedea52d197a8e

  • SHA256

    a2c91743a0834cd1fb63c6965c581e1f5a57f1d2fcb226985423894ac814c93a

  • SHA512

    0236158fa2bea4a62870fc829c0e022a252b0e77aff999d6ca195160334cdccb0eb57d23fa5d830cc19b201d545aa8d63b95c9f9e1b49d9995ba07071837b283

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.afiljgmj.cqxyivb
    1⤵
    • Loads dropped Dex/Jar
    PID:4831
    • com.afiljgmj.cqxyivb
      2⤵
        PID:4885
      • /system/bin/dex2oat
        2⤵
        • Loads dropped Dex/Jar
        PID:4885

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads