Analysis

  • max time kernel
    2942132s
  • max time network
    170s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    12-12-2021 15:55

General

  • Target

    19354_Video_Oynatıcı.apk

  • Size

    4.5MB

  • MD5

    2e163c1515b7fd0c256cad114136317f

  • SHA1

    ee108de379a86d9573a2e474e63d96a1abc83e01

  • SHA256

    c2ef244e7a1980880aeb212672705e877851b9cc054e023015dd748c8e69ab38

  • SHA512

    c644b7dc39d61538296d21218dc464469015664cd0937af77ae5319ac0e8fc9b80e509bd946bc2d5dacb2b7d21b5ff1bc3e3db194039d695e49b57db8f51815a

Malware Config

Extracted

Family

hydra

C2

http://adellebruce437547.website

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

Processes

  • com.zcilextb.wyxtqvd
    1⤵
    • Loads dropped Dex/Jar
    PID:3641

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.zcilextb.wyxtqvd/7eGkijUU6y/IUTy9jghyfajiuw/base.apk.8gGgoej1.au7

    MD5

    a9bcfa490d46af1750badca67f069353

    SHA1

    cac994ce4532d54ab4e348c14eb50668fb041310

    SHA256

    9417c44bf6b6781e886beb1dca19a4398958ff11f3a209edf54d565fbfa0b721

    SHA512

    babb439cde9be06bf601ab30fc570004c0dfc317b1479e4bf90d7ce73e25e3da9194cba55adfd507f469f61c9b4567890b68090fc87e79fc443a4c83a4d3350a