Analysis

  • max time kernel
    1813106s
  • max time network
    179s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    29-11-2021 14:20

General

  • Target

    FlashPlayerV4.4.apk

  • Size

    9.1MB

  • MD5

    911543cab4073e59ca87008d63bda36c

  • SHA1

    ffd8264b3cbcbb579d19e0da9ed84e87fffcb988

  • SHA256

    145e5bfe12c95c7ef600bf134601d857b42b3e384463a6df163e5a998ba01405

  • SHA512

    4fa8700e1aa6a8134de890b1129b50380c0e189bef54db37f43d505e2b8007255fe3f0534b798be9b3db4005c46c1d25f2f8a90ee6586d0df88de178e5f35b06

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.qvnzaffa.tmrgsdc
    1⤵
    • Loads dropped Dex/Jar
    PID:4431

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads