Analysis

  • max time kernel
    799828s
  • max time network
    158s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    06-01-2022 13:53

General

  • Target

    28054_Video_Oynatıcı.apk

  • Size

    2.6MB

  • MD5

    1b922faa991ecc4989a577f3632fb354

  • SHA1

    a2facadad960ba106535d412c119aac03d89083f

  • SHA256

    069bddcaf8203ae0aa728e7745dd80203f688f446c6789b31c8f00ebcbfbe9c9

  • SHA512

    d3c5204f815eadf5606db38b12ec6c50dad6494ce93f30639f8cf16858f8be0b5054fd0a7fcfaedd002406c50bbbf31baa9e1f392e9a818598d6b4c77e0d6461

Malware Config

Extracted

Family

hydra

C2

http://viveklees437.website

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra Payload 2 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.cargo.coconut
    1⤵
    • Loads dropped Dex/Jar
    PID:6232

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.cargo.coconut/app_DynamicOptDex/xLCCg.json

    MD5

    5d6af22b79ec91ef157490ca0884637c

    SHA1

    0b62d02932fbd74b2a92f65d3acc9def86f0f831

    SHA256

    5e3f3574c4630e5d807ca19dc252c26b5391bab33f1fcf6e335b52afb5d0be27

    SHA512

    789fcf3fa7f5e27b52c5f902c8500295a273e44dc69ff4057a6258f721e5e6c81e9554bf5d6bf16afefb708d7b6bb22709b1c29c000086b4ec492089f4a2b5df

  • /data/user/0/com.cargo.coconut/app_DynamicOptDex/xLCCg.json

    MD5

    5d6af22b79ec91ef157490ca0884637c

    SHA1

    0b62d02932fbd74b2a92f65d3acc9def86f0f831

    SHA256

    5e3f3574c4630e5d807ca19dc252c26b5391bab33f1fcf6e335b52afb5d0be27

    SHA512

    789fcf3fa7f5e27b52c5f902c8500295a273e44dc69ff4057a6258f721e5e6c81e9554bf5d6bf16afefb708d7b6bb22709b1c29c000086b4ec492089f4a2b5df