Analysis
-
max time kernel
4185162s -
max time network
137s -
platform
android_x86 -
resource
android-x86-arm -
submitted
14-02-2022 18:15
Static task
static1
Behavioral task
behavioral1
Sample
b6e855cf003ac9c1ac0995f58d6d9fd7.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
b6e855cf003ac9c1ac0995f58d6d9fd7.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
b6e855cf003ac9c1ac0995f58d6d9fd7.apk
Resource
android-x64-arm64
General
-
Target
b6e855cf003ac9c1ac0995f58d6d9fd7.apk
-
Size
5.3MB
-
MD5
b6e855cf003ac9c1ac0995f58d6d9fd7
-
SHA1
ef819498317db4d9d84423d952e8d73b17589517
-
SHA256
75ca5adbf517aa4c5b872405043ee1eced9d64e7aec3d06107738861fbd646b2
-
SHA512
0298093112049b6520c8c873b0af54dbd25af9e19888cdfe889c383c81e404ce1cb5c5a2daff53583ba95398c60cf92593bde4315ab33d0806ee64387b4a4e7f
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mwwtqjkh.wdcvslp/fkFUtTgG7g/GGgGgUfajjtGUgI/base.apk.jIFjo6g1.uqk 5057 /system/bin/dex2oat /data/user/0/com.mwwtqjkh.wdcvslp/fkFUtTgG7g/GGgGgUfajjtGUgI/base.apk.jIFjo6g1.uqk 4981 com.mwwtqjkh.wdcvslp -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 78 ip-api.com -
Reads information about phone network operator.
Processes
-
com.mwwtqjkh.wdcvslp1⤵
- Loads dropped Dex/Jar
PID:4981 -
com.mwwtqjkh.wdcvslp2⤵PID:5057
-
-
/system/bin/dex2oat2⤵
- Loads dropped Dex/Jar
PID:5057
-
-
com.mwwtqjkh.wdcvslp2⤵PID:5364
-
-
toolbox2⤵PID:5364
-
-
com.mwwtqjkh.wdcvslp2⤵PID:5434
-
-
/system/bin/sh2⤵PID:5434
-
-
/system/bin/ndk_translation_program_runner_binfmt_misc2⤵PID:5434
-
-
com.mwwtqjkh.wdcvslp2⤵PID:5477
-
-
/system/bin/sh2⤵PID:5477
-
-
/system/bin/ndk_translation_program_runner_binfmt_misc2⤵PID:5477
-
/system/bin/ndk_translation_program_runner_binfmt_misc3⤵PID:5507
-
-
-
/system/bin/ndk_translation_program_runner_binfmt_misc1⤵PID:5517