Analysis
-
max time kernel
2349641s -
max time network
222s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
24-01-2022 12:18
Static task
static1
Behavioral task
behavioral1
Sample
easy.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
easy.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
easy.apk
Resource
android-x64-arm64
General
-
Target
easy.apk
-
Size
6.7MB
-
MD5
0ba895632674c1245059731ccb03e043
-
SHA1
e4d7f3fcf8836d5c9ea78185b609cc4cb2b97ebc
-
SHA256
989b61c69e7bbb1c50a8661975ccb723aa60856b2666c549e0a9f22191d09d8f
-
SHA512
3bb5eb1ab608027cb54c8507fc1c8c87d92e898bf80fe7f70b94ddb962e65d4f7831b53188c3cc4340619580b95920926e94e09f8633df0eae7027d6543c60ef
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.dqwoxlnl.sakiczmioc pid process /data/user/0/com.dqwoxlnl.sakiczm/hgigUiF8pt/faIGTky68gIIeyg/base.apk.giGkIUG1.pyi 6030 com.dqwoxlnl.sakiczm
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
32c21a89d1072b216671fdb43808e8fe
SHA1ac003cc26ceb130b99709d2d295d57308c36f1b7
SHA25642f698ce150190e625b1385bb8ea9a48c93dadcd181246aa875ff29d9d4548ac
SHA512e010832a898b2439db3b6238fab7599a4c4e84e98a813c1d9e0fb7a8f1d87908013b67173f9006a713445af566d1735c677c8ae272415fd4f31ff827a7bb21ca