Analysis

  • max time kernel
    3214823s
  • max time network
    160s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    03-02-2022 11:27

General

  • Target

    bawag.apk

  • Size

    5.2MB

  • MD5

    fbe054f9dc536a2f45a1f6f749921c8e

  • SHA1

    9077bcc825d16c7a37815630598e5bb3d7f4a4b7

  • SHA256

    61bd7ab9565b0f68aaadb94eb328832ca36102f35f490d5d45fe99716a88e790

  • SHA512

    af1bb1363a5c2beaf6c8bb8248a155487757424848f800845643e7b71a88a0e607660ea4438a032ba3fc7e0ceb8427c5d3b3cf89cf756b1e33ff54002f07ea91

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

Processes

  • com.kspepmau.wxhlgzk
    1⤵
    • Loads dropped Dex/Jar
    PID:3803
    • com.kspepmau.wxhlgzk
      2⤵
        PID:3901
      • toolbox
        2⤵
          PID:3901
        • com.kspepmau.wxhlgzk
          2⤵
            PID:3922
          • /system/bin/sh
            2⤵
              PID:3922

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • /data/user/0/com.kspepmau.wxhlgzk/IfgHjppjGI/7fGtjafIioejFgG/base.apk.kI8f7I71.I8a

            MD5

            7f504a22f338876b73b65699316da89c

            SHA1

            eff8721257cb7029be349dfb6ee2fe3d527a24e4

            SHA256

            06d449a0908276cde7d246f183cdaa127edc20bd7de0cd35eea1196cf99fa345

            SHA512

            a1b28dc01f509eef23af0d4bb01e1aa9fa466d019eb95245082e115838293b798d1a153754e92538f50b32df42fe451c40fc8fff39770edd746df2a458a1d0e3