Analysis
-
max time kernel
2029430s -
max time network
319s -
platform
android_x64 -
resource
android-x64 -
submitted
20-01-2022 19:28
Static task
static1
Behavioral task
behavioral1
Sample
9fa6f67e940c78a0ecec93f8b86b1637.apk
Resource
android-x64
General
-
Target
9fa6f67e940c78a0ecec93f8b86b1637.apk
-
Size
6.9MB
-
MD5
9fa6f67e940c78a0ecec93f8b86b1637
-
SHA1
00ce3716a6c43128e34ce3159c727b625b638117
-
SHA256
4367e93b85743eac8383eb686caa6891b86d3846f7d729a955927c3dd7229cd0
-
SHA512
4fca111479be69865dad9a9d1379d130d4fafceb2d6747563ec7c538b962beafdca2ab57f048865d2a09b188c4549083e5c03972c1ba27d4c23edccb0dc527cb
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.rjxyzjth.vhapusiioc pid process /data/user/0/com.rjxyzjth.vhapusi/dU99kG9IIU/gHg7d8jtpggIkku/base.apk.jGefIoU1.je8 3843 com.rjxyzjth.vhapusi
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.rjxyzjth.vhapusi/dU99kG9IIU/gHg7d8jtpggIkku/base.apk.jGefIoU1.je8MD5
52eb63de9b533305cd9837f7a09a66d9
SHA1a2e151886a7caab8b72e98d6fe3505f6c431f3c9
SHA2563029b7afab7b82989966005456bb1b03bffff70b4e5baa139d142cc8e03712a9
SHA512b18746ec8ff80680a5c183c873e5b1ba14d0fbd822a1613e06940f4d244b8ed12a905fa083b991c8daa969cf4637b0191b40151d2c716be7ccb95185e878e911