Analysis

  • max time kernel
    2349641s
  • max time network
    222s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    24-01-2022 12:18

General

  • Target

    easy.apk

  • Size

    6.7MB

  • MD5

    0ba895632674c1245059731ccb03e043

  • SHA1

    e4d7f3fcf8836d5c9ea78185b609cc4cb2b97ebc

  • SHA256

    989b61c69e7bbb1c50a8661975ccb723aa60856b2666c549e0a9f22191d09d8f

  • SHA512

    3bb5eb1ab608027cb54c8507fc1c8c87d92e898bf80fe7f70b94ddb962e65d4f7831b53188c3cc4340619580b95920926e94e09f8633df0eae7027d6543c60ef

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.dqwoxlnl.sakiczm
    1⤵
    • Loads dropped Dex/Jar
    PID:6030
    • com.dqwoxlnl.sakiczm
      2⤵
        PID:6287

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /data/user/0/com.dqwoxlnl.sakiczm/hgigUiF8pt/faIGTky68gIIeyg/base.apk.giGkIUG1.pyi

      MD5

      32c21a89d1072b216671fdb43808e8fe

      SHA1

      ac003cc26ceb130b99709d2d295d57308c36f1b7

      SHA256

      42f698ce150190e625b1385bb8ea9a48c93dadcd181246aa875ff29d9d4548ac

      SHA512

      e010832a898b2439db3b6238fab7599a4c4e84e98a813c1d9e0fb7a8f1d87908013b67173f9006a713445af566d1735c677c8ae272415fd4f31ff827a7bb21ca