Analysis

  • max time kernel
    2484500s
  • max time network
    179s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    07-12-2021 08:50

General

  • Target

    bawag.apk

  • Size

    7.4MB

  • MD5

    9326a01f58049dcd9947e91c71972fba

  • SHA1

    6686eec12836e010a929df0df3ca87b3d718d348

  • SHA256

    e80cb43578f6a8b2ded95c8a2e86076f3661d60e2f18ebd1f094308e1d593c87

  • SHA512

    7e1a4a26b384b5c611c6927ff5176fa9f75a6ce7488bfd080b7ea461dad7a54a4267f18d11d826de33fb85cde609824350b41ea59b730e116424397e4d7b3a70

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra Payload 2 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.donor.festival
    1⤵
    • Loads dropped Dex/Jar
    PID:4348

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.donor.festival/app_DynamicOptDex/mJDPd.json

    MD5

    99f6b6d85f85b8b6ce2d16a7f129699b

    SHA1

    1c3e3a79bc14b8ce3e4e97914406714a4e572d8e

    SHA256

    692a081dc59ead724bc04cb2d4f35b749de793b756bbcf34d9890aaedc59e51c

    SHA512

    4b1477f9d19215cc3dd245dfb4570120127ac08d286b1ef098202cae6a604eb433bfdf126487c66a7f59d9d2b8db272459abf0c728c31fb3dc0e217f7f3b778b

  • /data/user/0/com.donor.festival/app_DynamicOptDex/mJDPd.json

    MD5

    99f6b6d85f85b8b6ce2d16a7f129699b

    SHA1

    1c3e3a79bc14b8ce3e4e97914406714a4e572d8e

    SHA256

    692a081dc59ead724bc04cb2d4f35b749de793b756bbcf34d9890aaedc59e51c

    SHA512

    4b1477f9d19215cc3dd245dfb4570120127ac08d286b1ef098202cae6a604eb433bfdf126487c66a7f59d9d2b8db272459abf0c728c31fb3dc0e217f7f3b778b