Analysis
-
max time kernel
2484500s -
max time network
179s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
07-12-2021 08:50
Static task
static1
Behavioral task
behavioral1
Sample
bawag.apk
Resource
android-x64-arm64
0 signatures
0 seconds
General
-
Target
bawag.apk
-
Size
7.4MB
-
MD5
9326a01f58049dcd9947e91c71972fba
-
SHA1
6686eec12836e010a929df0df3ca87b3d718d348
-
SHA256
e80cb43578f6a8b2ded95c8a2e86076f3661d60e2f18ebd1f094308e1d593c87
-
SHA512
7e1a4a26b384b5c611c6927ff5176fa9f75a6ce7488bfd080b7ea461dad7a54a4267f18d11d826de33fb85cde609824350b41ea59b730e116424397e4d7b3a70
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra Payload 2 IoCs
resource yara_rule behavioral1/memory/4348-0.dex family_hydra behavioral1/memory/4348-1.dex family_hydra -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.donor.festival/app_DynamicOptDex/mJDPd.json 4348 com.donor.festival /data/user/0/com.donor.festival/app_DynamicOptDex/mJDPd.json 4348 com.donor.festival