Analysis
-
max time kernel
2484500s -
max time network
179s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
07-12-2021 08:50
Static task
static1
Behavioral task
behavioral1
Sample
bawag.apk
Resource
android-x64-arm64
General
-
Target
bawag.apk
-
Size
7.4MB
-
MD5
9326a01f58049dcd9947e91c71972fba
-
SHA1
6686eec12836e010a929df0df3ca87b3d718d348
-
SHA256
e80cb43578f6a8b2ded95c8a2e86076f3661d60e2f18ebd1f094308e1d593c87
-
SHA512
7e1a4a26b384b5c611c6927ff5176fa9f75a6ce7488bfd080b7ea461dad7a54a4267f18d11d826de33fb85cde609824350b41ea59b730e116424397e4d7b3a70
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra Payload 2 IoCs
Processes:
resource yara_rule /data/user/0/com.donor.festival/app_DynamicOptDex/mJDPd.json family_hydra /data/user/0/com.donor.festival/app_DynamicOptDex/mJDPd.json family_hydra -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.donor.festivalioc pid process /data/user/0/com.donor.festival/app_DynamicOptDex/mJDPd.json 4348 com.donor.festival /data/user/0/com.donor.festival/app_DynamicOptDex/mJDPd.json 4348 com.donor.festival
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
99f6b6d85f85b8b6ce2d16a7f129699b
SHA11c3e3a79bc14b8ce3e4e97914406714a4e572d8e
SHA256692a081dc59ead724bc04cb2d4f35b749de793b756bbcf34d9890aaedc59e51c
SHA5124b1477f9d19215cc3dd245dfb4570120127ac08d286b1ef098202cae6a604eb433bfdf126487c66a7f59d9d2b8db272459abf0c728c31fb3dc0e217f7f3b778b
-
MD5
99f6b6d85f85b8b6ce2d16a7f129699b
SHA11c3e3a79bc14b8ce3e4e97914406714a4e572d8e
SHA256692a081dc59ead724bc04cb2d4f35b749de793b756bbcf34d9890aaedc59e51c
SHA5124b1477f9d19215cc3dd245dfb4570120127ac08d286b1ef098202cae6a604eb433bfdf126487c66a7f59d9d2b8db272459abf0c728c31fb3dc0e217f7f3b778b