Resubmissions

20-01-2022 19:28

220120-x6zalsbcej 10

12-01-2022 15:08

220112-sh512adagm 7

Analysis

  • max time kernel
    2029430s
  • max time network
    319s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    20-01-2022 19:28

General

  • Target

    9fa6f67e940c78a0ecec93f8b86b1637.apk

  • Size

    6.9MB

  • MD5

    9fa6f67e940c78a0ecec93f8b86b1637

  • SHA1

    00ce3716a6c43128e34ce3159c727b625b638117

  • SHA256

    4367e93b85743eac8383eb686caa6891b86d3846f7d729a955927c3dd7229cd0

  • SHA512

    4fca111479be69865dad9a9d1379d130d4fafceb2d6747563ec7c538b962beafdca2ab57f048865d2a09b188c4549083e5c03972c1ba27d4c23edccb0dc527cb

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.rjxyzjth.vhapusi
    1⤵
    • Loads dropped Dex/Jar
    PID:3843
    • com.rjxyzjth.vhapusi
      2⤵
        PID:3944
      • toolbox
        2⤵
          PID:3944

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • /data/user/0/com.rjxyzjth.vhapusi/dU99kG9IIU/gHg7d8jtpggIkku/base.apk.jGefIoU1.je8
        MD5

        52eb63de9b533305cd9837f7a09a66d9

        SHA1

        a2e151886a7caab8b72e98d6fe3505f6c431f3c9

        SHA256

        3029b7afab7b82989966005456bb1b03bffff70b4e5baa139d142cc8e03712a9

        SHA512

        b18746ec8ff80680a5c183c873e5b1ba14d0fbd822a1613e06940f4d244b8ed12a905fa083b991c8daa969cf4637b0191b40151d2c716be7ccb95185e878e911