Analysis

  • max time kernel
    3633276s
  • max time network
    168s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    08-02-2022 08:57

General

  • Target

    bawag.apk

  • Size

    7.1MB

  • MD5

    fe213493a9e0ea129cb1fc2477e6fd92

  • SHA1

    4952a1729ad0801823e3c71280c9f1d3429d2b17

  • SHA256

    f84e5ccc0c78f97e27d486f22c28f7f3c8f48f7455f51ce4c89940297057fd26

  • SHA512

    a950b627ade1410a313fe3cfd4fd6d8d0366cdca93597182a11055083dbe4070f13363c543abfdfb1f27935f8c2720c7abd5d74881b431b92a80064a2663fbed

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

Processes

  • com.msvmjhta.mekecjf
    1⤵
    • Loads dropped Dex/Jar
    PID:3805
    • com.msvmjhta.mekecjf
      2⤵
        PID:3903

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /data/user/0/com.msvmjhta.mekecjf/yggwfgyoyw/yajoTuhUujdguGy/base.apk.aUyG7kf1.k8y

      MD5

      5e585ff147438ea6f915a51548ec16e0

      SHA1

      b94e914463f8ccac4f0a95606295ddba96a13805

      SHA256

      57af682058facbfea07727acb35705794aaefe839c76d5ed1e796021e964f86c

      SHA512

      d3ea63e52b6424a9955567ffcd1815129ca93835c982eb41783d521f3b5efd078a30304554725a535be6052ead4457d551dad0098cd0c80b499502eb628ba4b8