Analysis
-
max time kernel
1145614s -
max time network
205s -
platform
android_x64 -
resource
android-x64 -
submitted
10-01-2022 13:52
Static task
static1
Behavioral task
behavioral1
Sample
650e812437430a8f437eb1ec15daa6667d114c3c98a4ca22a1afef1ad4f7a13c.apk
Resource
android-x64
General
-
Target
650e812437430a8f437eb1ec15daa6667d114c3c98a4ca22a1afef1ad4f7a13c.apk
-
Size
6.9MB
-
MD5
ea12aba15c8196d6d9862a3e36e3afae
-
SHA1
fad296acd12a25e2bdf80c1c9e82a592a8bd06fd
-
SHA256
650e812437430a8f437eb1ec15daa6667d114c3c98a4ca22a1afef1ad4f7a13c
-
SHA512
9c95e4d0387520a4ce1961cbf60ff5eb56543a3b79bf53b415c83fa7f5c96beb7d3dfedcd730740f0996cd1d4d5197d0dcca2098a857bf073fa775543fd94d36
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.ueojywht.gjfnrytioc pid process /data/user/0/com.ueojywht.gjfnryt/uGg9ykt88w/iuiUifTjffIgtkt/base.apk.8ffgiGH1.ggf 3860 com.ueojywht.gjfnryt -
Reads information about phone network operator.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
36805921d8428a483c57a7db3230054d
SHA127da64cbc0cfadca1f74851b7da0a9e226819fa2
SHA2564477b5b9f589f52f86ee95e8a66156083b071c3687a6dd1dfe84e324d61ee9e5
SHA5122f75821ea1ff51664efb13af44f84dcec23836da36b7532df42cc8afb5eac50b91469a63599d0039b9993aba8b36c95f646ede03d7c1508f3416a468d29eb74f