Analysis

  • max time kernel
    1813106s
  • max time network
    179s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    29-11-2021 14:20

General

  • Target

    FlashPlayerV4.4.apk

  • Size

    9.1MB

  • MD5

    911543cab4073e59ca87008d63bda36c

  • SHA1

    ffd8264b3cbcbb579d19e0da9ed84e87fffcb988

  • SHA256

    145e5bfe12c95c7ef600bf134601d857b42b3e384463a6df163e5a998ba01405

  • SHA512

    4fa8700e1aa6a8134de890b1129b50380c0e189bef54db37f43d505e2b8007255fe3f0534b798be9b3db4005c46c1d25f2f8a90ee6586d0df88de178e5f35b06

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.qvnzaffa.tmrgsdc
    1⤵
    • Loads dropped Dex/Jar
    PID:4431

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.qvnzaffa.tmrgsdc/lfgukixywk/bugffiwtkcwuzlf/base.apk.hyxgphh1.miq
    MD5

    22a7539de98e019b542e5adecb4edd48

    SHA1

    ce2804e7936a97701d890da0f6da76c88ee433f9

    SHA256

    7d7545be64fbf462ecc2cc59e27909119479ba95a5eb8414704a27986e3cb76e

    SHA512

    c5a7ddad2b935e6ce2f8801a2a3e111347c23f0e8ab960bc04ca633a685f5d30aa415a1e46aaf1468a6b5417e8f8de628d7989717b818dcc4c5543b137ddd322