Analysis
-
max time kernel
1813106s -
max time network
179s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
29-11-2021 14:20
Static task
static1
Behavioral task
behavioral1
Sample
FlashPlayerV4.4.apk
Resource
android-x64-arm64
General
-
Target
FlashPlayerV4.4.apk
-
Size
9.1MB
-
MD5
911543cab4073e59ca87008d63bda36c
-
SHA1
ffd8264b3cbcbb579d19e0da9ed84e87fffcb988
-
SHA256
145e5bfe12c95c7ef600bf134601d857b42b3e384463a6df163e5a998ba01405
-
SHA512
4fa8700e1aa6a8134de890b1129b50380c0e189bef54db37f43d505e2b8007255fe3f0534b798be9b3db4005c46c1d25f2f8a90ee6586d0df88de178e5f35b06
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.qvnzaffa.tmrgsdcioc pid process /data/user/0/com.qvnzaffa.tmrgsdc/lfgukixywk/bugffiwtkcwuzlf/base.apk.hyxgphh1.miq 4431 com.qvnzaffa.tmrgsdc
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.qvnzaffa.tmrgsdc/lfgukixywk/bugffiwtkcwuzlf/base.apk.hyxgphh1.miqMD5
22a7539de98e019b542e5adecb4edd48
SHA1ce2804e7936a97701d890da0f6da76c88ee433f9
SHA2567d7545be64fbf462ecc2cc59e27909119479ba95a5eb8414704a27986e3cb76e
SHA512c5a7ddad2b935e6ce2f8801a2a3e111347c23f0e8ab960bc04ca633a685f5d30aa415a1e46aaf1468a6b5417e8f8de628d7989717b818dcc4c5543b137ddd322