Analysis
-
max time kernel
1002012s -
max time network
197s -
platform
android_x64 -
resource
android-x64 -
submitted
08-01-2022 22:02
Static task
static1
Behavioral task
behavioral1
Sample
90621_Video_Oynatıcı.apk
Resource
android-x64
General
-
Target
90621_Video_Oynatıcı.apk
-
Size
2.5MB
-
MD5
4403836ac9af55e0dc0300cc58a3355c
-
SHA1
e8a82a7a115a5805ff6a578bf7b1c2e84a426787
-
SHA256
1bb3ac10b2cdd0a1edb3c730f766cb48e8173dbccea04a9afe44f3aef1060682
-
SHA512
399593d7c2b9aec2f34aa803527e90bcb126d62cf5a6a7ddd5c6367dea4be683d287841f92eaa4dfae2a836300da688005535c3a92b660731db1a8630f4e0d66
Malware Config
Extracted
hydra
http://mekhimccabe5573.website
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra Payload 2 IoCs
Processes:
resource yara_rule /data/user/0/com.flush.room/app_DynamicOptDex/gt.json family_hydra /data/user/0/com.flush.room/app_DynamicOptDex/gt.json family_hydra -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.flush.roomioc pid process /data/user/0/com.flush.room/app_DynamicOptDex/gt.json 3859 com.flush.room /data/user/0/com.flush.room/app_DynamicOptDex/gt.json 3859 com.flush.room -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
562f6e8e03815e0df28de16287d0b5bf
SHA13ff388f50a89ba9eaad0ef056ab907837b6d4d30
SHA2565f61b9efc763ddbd5be95c6d561901691bc79017e5614cfe43f9c5e8bd1e6239
SHA51299288b932bb2f2559717392c616f5bc66ab724c53f79186b8f9246e07b322d527c779c6368c991198e1b27f88f0edd1703ce8ef1d02f5f1c690b05d7d773d4e5
-
MD5
562f6e8e03815e0df28de16287d0b5bf
SHA13ff388f50a89ba9eaad0ef056ab907837b6d4d30
SHA2565f61b9efc763ddbd5be95c6d561901691bc79017e5614cfe43f9c5e8bd1e6239
SHA51299288b932bb2f2559717392c616f5bc66ab724c53f79186b8f9246e07b322d527c779c6368c991198e1b27f88f0edd1703ce8ef1d02f5f1c690b05d7d773d4e5