Analysis

  • max time kernel
    2510316s
  • max time network
    139s
  • platform
    android_x86
  • resource
    android-x86-arm
  • submitted
    26-01-2022 09:01

General

  • Target

    psk.apk

  • Size

    6.9MB

  • MD5

    0cf1b5b0244c4bb324412bce80d33352

  • SHA1

    9b5c773c3a13014d620a38f9da146459da30b54b

  • SHA256

    d5a64f4885dffab0a12c161d7eff5722294eda8111242ddfadee907f6a609e4d

  • SHA512

    4fd37b310176b24c8faccc7e0b8cc891e3c397127592548ac7c2f55cbf9216db58d3e0f5dc9b4fcefa74c8026b3764588bf305916edcf21425b21b2bd9c7feb2

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Reads information about phone network operator.

Processes

  • com.zharuirh.wytppzi
    1⤵
    • Loads dropped Dex/Jar
    PID:5022
    • com.zharuirh.wytppzi
      2⤵
        PID:5140
      • /system/bin/dex2oat
        2⤵
        • Loads dropped Dex/Jar
        PID:5140
      • com.zharuirh.wytppzi
        2⤵
          PID:5424
        • toolbox
          2⤵
            PID:5424
          • com.zharuirh.wytppzi
            2⤵
              PID:5454
            • /system/bin/sh
              2⤵
                PID:5454
              • /system/bin/ndk_translation_program_runner_binfmt_misc
                2⤵
                  PID:5454
                • com.zharuirh.wytppzi
                  2⤵
                    PID:5573
                  • /system/bin/sh
                    2⤵
                      PID:5573
                    • /system/bin/ndk_translation_program_runner_binfmt_misc
                      2⤵
                        PID:5573
                        • /system/bin/ndk_translation_program_runner_binfmt_misc
                          3⤵
                            PID:5652
                      • /system/bin/ndk_translation_program_runner_binfmt_misc
                        1⤵
                          PID:5665

                        Network

                        MITRE ATT&CK Matrix

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • /data/user/0/com.zharuirh.wytppzi/afUkGIaaji/wkhyygtjjiwwfgu/base.apk.UfUiiHU1.jU8
                          MD5

                          02bf80bb1309cd6f822114405895ea40

                          SHA1

                          b9c987e3d6cf1be6b67132c775d667ac8f32fd88

                          SHA256

                          4c172f2fba2b747e2b8fb996bc24de2b5b4c39d0a75e46d84a7d08dfda631808

                          SHA512

                          8411c7c8a5985da6f19cb0865f7ae4831af5250165b436f81c213c28826d2b3958a8914bf4e44f04e2799cf46420cbae56830f02454ebc3f1a579c7e6f52c2ce

                        • /data/user/0/com.zharuirh.wytppzi/afUkGIaaji/wkhyygtjjiwwfgu/base.apk.UfUiiHU1.jU8
                          MD5

                          a0cf7a0fe15ae1b1e30194914b4b1051

                          SHA1

                          befe67953cab35da4f6943fa961dcf533c680c01

                          SHA256

                          d875a4e94374d4ecb3dc1816a610c7c7912d44e8a89f6265a96f7d6a08b97765

                          SHA512

                          f082578f7402ee9c1966873b0ee7c95177b26cadb1f2e0c7038656c43682694d4e072732b6cd28af4c8084df1c1b66c634b25987af6e4eb1cca01f7f0883f116