Analysis
-
max time kernel
3633276s -
max time network
168s -
platform
android_x64 -
resource
android-x64 -
submitted
08-02-2022 08:57
Static task
static1
Behavioral task
behavioral1
Sample
bawag.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
bawag.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
bawag.apk
Resource
android-x64-arm64
General
-
Target
bawag.apk
-
Size
7.1MB
-
MD5
fe213493a9e0ea129cb1fc2477e6fd92
-
SHA1
4952a1729ad0801823e3c71280c9f1d3429d2b17
-
SHA256
f84e5ccc0c78f97e27d486f22c28f7f3c8f48f7455f51ce4c89940297057fd26
-
SHA512
a950b627ade1410a313fe3cfd4fd6d8d0366cdca93597182a11055083dbe4070f13363c543abfdfb1f27935f8c2720c7abd5d74881b431b92a80064a2663fbed
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.msvmjhta.mekecjfioc pid process /data/user/0/com.msvmjhta.mekecjf/yggwfgyoyw/yajoTuhUujdguGy/base.apk.aUyG7kf1.k8y 3805 com.msvmjhta.mekecjf -
Reads information about phone network operator.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
5e585ff147438ea6f915a51548ec16e0
SHA1b94e914463f8ccac4f0a95606295ddba96a13805
SHA25657af682058facbfea07727acb35705794aaefe839c76d5ed1e796021e964f86c
SHA512d3ea63e52b6424a9955567ffcd1815129ca93835c982eb41783d521f3b5efd078a30304554725a535be6052ead4457d551dad0098cd0c80b499502eb628ba4b8