Analysis

  • max time kernel
    1145614s
  • max time network
    205s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    10-01-2022 13:52

General

  • Target

    650e812437430a8f437eb1ec15daa6667d114c3c98a4ca22a1afef1ad4f7a13c.apk

  • Size

    6.9MB

  • MD5

    ea12aba15c8196d6d9862a3e36e3afae

  • SHA1

    fad296acd12a25e2bdf80c1c9e82a592a8bd06fd

  • SHA256

    650e812437430a8f437eb1ec15daa6667d114c3c98a4ca22a1afef1ad4f7a13c

  • SHA512

    9c95e4d0387520a4ce1961cbf60ff5eb56543a3b79bf53b415c83fa7f5c96beb7d3dfedcd730740f0996cd1d4d5197d0dcca2098a857bf073fa775543fd94d36

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

Processes

  • com.ueojywht.gjfnryt
    1⤵
    • Loads dropped Dex/Jar
    PID:3860
    • com.ueojywht.gjfnryt
      2⤵
        PID:3964
      • toolbox
        2⤵
          PID:3964
        • com.ueojywht.gjfnryt
          2⤵
            PID:3994
          • /system/bin/sh
            2⤵
              PID:3994

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • /data/user/0/com.ueojywht.gjfnryt/uGg9ykt88w/iuiUifTjffIgtkt/base.apk.8ffgiGH1.ggf

            MD5

            36805921d8428a483c57a7db3230054d

            SHA1

            27da64cbc0cfadca1f74851b7da0a9e226819fa2

            SHA256

            4477b5b9f589f52f86ee95e8a66156083b071c3687a6dd1dfe84e324d61ee9e5

            SHA512

            2f75821ea1ff51664efb13af44f84dcec23836da36b7532df42cc8afb5eac50b91469a63599d0039b9993aba8b36c95f646ede03d7c1508f3416a468d29eb74f