Analysis
-
max time kernel
799828s -
max time network
158s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
06-01-2022 13:53
Static task
static1
Behavioral task
behavioral1
Sample
28054_Video_Oynatıcı.apk
Resource
android-x64-arm64
General
-
Target
28054_Video_Oynatıcı.apk
-
Size
2.6MB
-
MD5
1b922faa991ecc4989a577f3632fb354
-
SHA1
a2facadad960ba106535d412c119aac03d89083f
-
SHA256
069bddcaf8203ae0aa728e7745dd80203f688f446c6789b31c8f00ebcbfbe9c9
-
SHA512
d3c5204f815eadf5606db38b12ec6c50dad6494ce93f30639f8cf16858f8be0b5054fd0a7fcfaedd002406c50bbbf31baa9e1f392e9a818598d6b4c77e0d6461
Malware Config
Extracted
hydra
http://viveklees437.website
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra Payload 2 IoCs
Processes:
resource yara_rule /data/user/0/com.cargo.coconut/app_DynamicOptDex/xLCCg.json family_hydra /data/user/0/com.cargo.coconut/app_DynamicOptDex/xLCCg.json family_hydra -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.cargo.coconutioc pid process /data/user/0/com.cargo.coconut/app_DynamicOptDex/xLCCg.json 6232 com.cargo.coconut /data/user/0/com.cargo.coconut/app_DynamicOptDex/xLCCg.json 6232 com.cargo.coconut
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
5d6af22b79ec91ef157490ca0884637c
SHA10b62d02932fbd74b2a92f65d3acc9def86f0f831
SHA2565e3f3574c4630e5d807ca19dc252c26b5391bab33f1fcf6e335b52afb5d0be27
SHA512789fcf3fa7f5e27b52c5f902c8500295a273e44dc69ff4057a6258f721e5e6c81e9554bf5d6bf16afefb708d7b6bb22709b1c29c000086b4ec492089f4a2b5df
-
MD5
5d6af22b79ec91ef157490ca0884637c
SHA10b62d02932fbd74b2a92f65d3acc9def86f0f831
SHA2565e3f3574c4630e5d807ca19dc252c26b5391bab33f1fcf6e335b52afb5d0be27
SHA512789fcf3fa7f5e27b52c5f902c8500295a273e44dc69ff4057a6258f721e5e6c81e9554bf5d6bf16afefb708d7b6bb22709b1c29c000086b4ec492089f4a2b5df