Analysis
-
max time kernel
2942132s -
max time network
170s -
platform
android_x64 -
resource
android-x64 -
submitted
12-12-2021 15:55
Static task
static1
Behavioral task
behavioral1
Sample
19354_Video_Oynatıcı.apk
Resource
android-x64
General
-
Target
19354_Video_Oynatıcı.apk
-
Size
4.5MB
-
MD5
2e163c1515b7fd0c256cad114136317f
-
SHA1
ee108de379a86d9573a2e474e63d96a1abc83e01
-
SHA256
c2ef244e7a1980880aeb212672705e877851b9cc054e023015dd748c8e69ab38
-
SHA512
c644b7dc39d61538296d21218dc464469015664cd0937af77ae5319ac0e8fc9b80e509bd946bc2d5dacb2b7d21b5ff1bc3e3db194039d695e49b57db8f51815a
Malware Config
Extracted
hydra
http://adellebruce437547.website
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.zcilextb.wyxtqvdioc pid process /data/user/0/com.zcilextb.wyxtqvd/7eGkijUU6y/IUTy9jghyfajiuw/base.apk.8gGgoej1.au7 3641 com.zcilextb.wyxtqvd -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a9bcfa490d46af1750badca67f069353
SHA1cac994ce4532d54ab4e348c14eb50668fb041310
SHA2569417c44bf6b6781e886beb1dca19a4398958ff11f3a209edf54d565fbfa0b721
SHA512babb439cde9be06bf601ab30fc570004c0dfc317b1479e4bf90d7ce73e25e3da9194cba55adfd507f469f61c9b4567890b68090fc87e79fc443a4c83a4d3350a