Analysis
-
max time kernel
2510316s -
max time network
139s -
platform
android_x86 -
resource
android-x86-arm -
submitted
26-01-2022 09:01
Static task
static1
Behavioral task
behavioral1
Sample
psk.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
psk.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
psk.apk
Resource
android-x64-arm64
General
-
Target
psk.apk
-
Size
6.9MB
-
MD5
0cf1b5b0244c4bb324412bce80d33352
-
SHA1
9b5c773c3a13014d620a38f9da146459da30b54b
-
SHA256
d5a64f4885dffab0a12c161d7eff5722294eda8111242ddfadee907f6a609e4d
-
SHA512
4fd37b310176b24c8faccc7e0b8cc891e3c397127592548ac7c2f55cbf9216db58d3e0f5dc9b4fcefa74c8026b3764588bf305916edcf21425b21b2bd9c7feb2
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oatcom.zharuirh.wytppziioc pid process /data/user/0/com.zharuirh.wytppzi/afUkGIaaji/wkhyygtjjiwwfgu/base.apk.UfUiiHU1.jU8 5140 /system/bin/dex2oat /data/user/0/com.zharuirh.wytppzi/afUkGIaaji/wkhyygtjjiwwfgu/base.apk.UfUiiHU1.jU8 5022 com.zharuirh.wytppzi -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 63 ip-api.com -
Reads information about phone network operator.
Processes
-
com.zharuirh.wytppzi1⤵
- Loads dropped Dex/Jar
-
com.zharuirh.wytppzi2⤵
-
/system/bin/dex2oat2⤵
- Loads dropped Dex/Jar
-
com.zharuirh.wytppzi2⤵
-
toolbox2⤵
-
com.zharuirh.wytppzi2⤵
-
/system/bin/sh2⤵
-
/system/bin/ndk_translation_program_runner_binfmt_misc2⤵
-
com.zharuirh.wytppzi2⤵
-
/system/bin/sh2⤵
-
/system/bin/ndk_translation_program_runner_binfmt_misc2⤵
-
/system/bin/ndk_translation_program_runner_binfmt_misc3⤵
-
/system/bin/ndk_translation_program_runner_binfmt_misc1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.zharuirh.wytppzi/afUkGIaaji/wkhyygtjjiwwfgu/base.apk.UfUiiHU1.jU8MD5
02bf80bb1309cd6f822114405895ea40
SHA1b9c987e3d6cf1be6b67132c775d667ac8f32fd88
SHA2564c172f2fba2b747e2b8fb996bc24de2b5b4c39d0a75e46d84a7d08dfda631808
SHA5128411c7c8a5985da6f19cb0865f7ae4831af5250165b436f81c213c28826d2b3958a8914bf4e44f04e2799cf46420cbae56830f02454ebc3f1a579c7e6f52c2ce
-
/data/user/0/com.zharuirh.wytppzi/afUkGIaaji/wkhyygtjjiwwfgu/base.apk.UfUiiHU1.jU8MD5
a0cf7a0fe15ae1b1e30194914b4b1051
SHA1befe67953cab35da4f6943fa961dcf533c680c01
SHA256d875a4e94374d4ecb3dc1816a610c7c7912d44e8a89f6265a96f7d6a08b97765
SHA512f082578f7402ee9c1966873b0ee7c95177b26cadb1f2e0c7038656c43682694d4e072732b6cd28af4c8084df1c1b66c634b25987af6e4eb1cca01f7f0883f116