Analysis

  • max time kernel
    799879s
  • max time network
    196s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    06-01-2022 13:53

General

  • Target

    37209_Video_Oynatıcı.apk

  • Size

    2.5MB

  • MD5

    4b3d7940c616d04f0b0ec98abba0ec52

  • SHA1

    4b6ccfb7644a02fd10cdf16398df50d368645409

  • SHA256

    ae47584cc5b96611a40bf28683e4a31741514dca3fd428639ac7814d5cc7cf16

  • SHA512

    a113cc24d27c5d44f418e61aab0dafc8d99e23ab7248b4c28b474bb2b778e9a6bb169b6b58d957f38134c7f16f26718b50e92cc139e7dc1c5a1c39d21a278526

Malware Config

Extracted

Family

hydra

C2

http://viveklees437.website

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra Payload 2 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.expect.negative
    1⤵
    • Loads dropped Dex/Jar
    PID:6019

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads