Analysis
-
max time kernel
3214823s -
max time network
160s -
platform
android_x64 -
resource
android-x64 -
submitted
03-02-2022 11:27
Static task
static1
Behavioral task
behavioral1
Sample
bawag.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
bawag.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
bawag.apk
Resource
android-x64-arm64
General
-
Target
bawag.apk
-
Size
5.2MB
-
MD5
fbe054f9dc536a2f45a1f6f749921c8e
-
SHA1
9077bcc825d16c7a37815630598e5bb3d7f4a4b7
-
SHA256
61bd7ab9565b0f68aaadb94eb328832ca36102f35f490d5d45fe99716a88e790
-
SHA512
af1bb1363a5c2beaf6c8bb8248a155487757424848f800845643e7b71a88a0e607660ea4438a032ba3fc7e0ceb8427c5d3b3cf89cf756b1e33ff54002f07ea91
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.kspepmau.wxhlgzkioc pid process /data/user/0/com.kspepmau.wxhlgzk/IfgHjppjGI/7fGtjafIioejFgG/base.apk.kI8f7I71.I8a 3803 com.kspepmau.wxhlgzk -
Reads information about phone network operator.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
7f504a22f338876b73b65699316da89c
SHA1eff8721257cb7029be349dfb6ee2fe3d527a24e4
SHA25606d449a0908276cde7d246f183cdaa127edc20bd7de0cd35eea1196cf99fa345
SHA512a1b28dc01f509eef23af0d4bb01e1aa9fa466d019eb95245082e115838293b798d1a153754e92538f50b32df42fe451c40fc8fff39770edd746df2a458a1d0e3