Analysis

  • max time kernel
    2422357s
  • max time network
    180s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    25/01/2022, 08:23

General

  • Target

    731902e361e100b7f10e06c87200e06bebcb2bb3bee32d2a155c36120ea4cba2.apk

  • Size

    1.6MB

  • MD5

    67fb423577c01a0739b7a0d43951ef79

  • SHA1

    c328c6e3b11bdce2ba682ccecf594a7b88b8d130

  • SHA256

    731902e361e100b7f10e06c87200e06bebcb2bb3bee32d2a155c36120ea4cba2

  • SHA512

    1dbcb4c571a316e738e7464335413ed340aa78d21d460257012a86434e831a43bb71b5da442d0bc1889d5faa4d43b490dfff97669446618aedc3751a9af544ea

Malware Config

Extracted

Family

hydra

C2

http://fullvehdvideoizlemeayarlari4545.site

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra Payload 1 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.rally.trade
    1⤵
    • Loads dropped Dex/Jar
    PID:6230

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads