Analysis

  • max time kernel
    1002012s
  • max time network
    197s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    08-01-2022 22:02

General

  • Target

    90621_Video_Oynatıcı.apk

  • Size

    2.5MB

  • MD5

    4403836ac9af55e0dc0300cc58a3355c

  • SHA1

    e8a82a7a115a5805ff6a578bf7b1c2e84a426787

  • SHA256

    1bb3ac10b2cdd0a1edb3c730f766cb48e8173dbccea04a9afe44f3aef1060682

  • SHA512

    399593d7c2b9aec2f34aa803527e90bcb126d62cf5a6a7ddd5c6367dea4be683d287841f92eaa4dfae2a836300da688005535c3a92b660731db1a8630f4e0d66

Malware Config

Extracted

Family

hydra

C2

http://mekhimccabe5573.website

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra Payload 2 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

Processes

  • com.flush.room
    1⤵
    • Loads dropped Dex/Jar
    PID:3859

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.flush.room/app_DynamicOptDex/gt.json

    MD5

    562f6e8e03815e0df28de16287d0b5bf

    SHA1

    3ff388f50a89ba9eaad0ef056ab907837b6d4d30

    SHA256

    5f61b9efc763ddbd5be95c6d561901691bc79017e5614cfe43f9c5e8bd1e6239

    SHA512

    99288b932bb2f2559717392c616f5bc66ab724c53f79186b8f9246e07b322d527c779c6368c991198e1b27f88f0edd1703ce8ef1d02f5f1c690b05d7d773d4e5

  • /data/user/0/com.flush.room/app_DynamicOptDex/gt.json

    MD5

    562f6e8e03815e0df28de16287d0b5bf

    SHA1

    3ff388f50a89ba9eaad0ef056ab907837b6d4d30

    SHA256

    5f61b9efc763ddbd5be95c6d561901691bc79017e5614cfe43f9c5e8bd1e6239

    SHA512

    99288b932bb2f2559717392c616f5bc66ab724c53f79186b8f9246e07b322d527c779c6368c991198e1b27f88f0edd1703ce8ef1d02f5f1c690b05d7d773d4e5