Analysis

  • max time kernel
    3265840s
  • max time network
    149s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    16-12-2021 09:42

General

  • Target

    f8d6d8bc3a653b709388788c38f1fdccb90cca3d0614bc0b25fbe00f6149612e.apk

  • Size

    6.9MB

  • MD5

    16c009e5049f1bf213e9e2773634bd1f

  • SHA1

    7b04fae79b75e7d10bec84b3df20fac321d19bf3

  • SHA256

    f8d6d8bc3a653b709388788c38f1fdccb90cca3d0614bc0b25fbe00f6149612e

  • SHA512

    955589f566090512361070bc2bd80140aba4db77e9fc441e9f11afe7b22b79a2c4ebc40c8e57aae7dd8b3919416e22c54a39a7c059e4a2dae735d299b86b4550

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra Payload 2 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

Processes

  • com.illegal.faint
    1⤵
    • Loads dropped Dex/Jar
    PID:3665
    • com.illegal.faint
      2⤵
        PID:3816
      • toolbox
        2⤵
          PID:3816
        • com.illegal.faint
          2⤵
            PID:3851
          • /system/bin/sh
            2⤵
              PID:3851

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads