Analysis
-
max time kernel
1813106s -
max time network
179s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
29-11-2021 14:20
Static task
static1
Behavioral task
behavioral1
Sample
FlashPlayerV4.4.apk
Resource
android-x64-arm64
0 signatures
0 seconds
General
-
Target
FlashPlayerV4.4.apk
-
Size
9.1MB
-
MD5
911543cab4073e59ca87008d63bda36c
-
SHA1
ffd8264b3cbcbb579d19e0da9ed84e87fffcb988
-
SHA256
145e5bfe12c95c7ef600bf134601d857b42b3e384463a6df163e5a998ba01405
-
SHA512
4fa8700e1aa6a8134de890b1129b50380c0e189bef54db37f43d505e2b8007255fe3f0534b798be9b3db4005c46c1d25f2f8a90ee6586d0df88de178e5f35b06
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.qvnzaffa.tmrgsdc/lfgukixywk/bugffiwtkcwuzlf/base.apk.hyxgphh1.miq 4431 com.qvnzaffa.tmrgsdc