Analysis
-
max time kernel
4236758s -
max time network
142s -
platform
android_x86 -
resource
android-x86-arm -
submitted
15-02-2022 08:35
Static task
static1
Behavioral task
behavioral1
Sample
a1.apk
Resource
android-x86-arm
android_x86
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
a1.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
a1.apk
Resource
android-x64-arm64
android_x64
0 signatures
0 seconds
General
-
Target
a1.apk
-
Size
5.5MB
-
MD5
99c0124bd826def2b7061ce7ff37b2e3
-
SHA1
0217ace39fe25d09fa3ffad7594b3ab954aba097
-
SHA256
26845b2bcec8c8d0bf31ca021ddc631c99a10fbeeaa4ddbbc9bdc73de1bb3a2c
-
SHA512
d4b81e7c67b90eec445ecb6edb994b5419f9ed11cb83b6d1ea6702f6fbd67d92f32d349ce9a47c110b3ecdf7b3f5ba5212891e3caf1a28352c73ec959cef5740
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.qnnhyhxs.fnwxizy/6fhf89eIgG/d8h8GwywU8ei8Tu/base.apk.ifGItGe1.eqy 5101 /system/bin/dex2oat /data/user/0/com.qnnhyhxs.fnwxizy/6fhf89eIgG/d8h8GwywU8ei8Tu/base.apk.ifGItGe1.eqy 5001 com.qnnhyhxs.fnwxizy -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 82 ip-api.com -
Reads information about phone network operator.