Analysis
-
max time kernel
4255292s -
max time network
145s -
platform
android_x86 -
resource
android-x86-arm -
submitted
15-02-2022 13:44
Static task
static1
Behavioral task
behavioral1
Sample
bawag.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
bawag.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
bawag.apk
Resource
android-x64-arm64
General
-
Target
bawag.apk
-
Size
6.2MB
-
MD5
4212125ef94304e3dd9659186204fc5c
-
SHA1
c807313be5dd0fc754ba913d1b7e6a40bd8a663f
-
SHA256
507f55a17a03490978c09690fc2f11a900b52ff7bc4a73f8af9ea9c586b83d75
-
SHA512
709c3d2975b5c1b4740bd80e4b9a8a10d97e584b9cfe75185b5d4fb2f78fa2868bafbc328a2234786226233a54826eff25f929d2dc7e27d70300c7ce50d8f21d
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oatcom.nfrwxqmj.tixwgeaioc pid process /data/user/0/com.nfrwxqmj.tixwgea/Gg9Gug9G6G/ItUfyqfo8gwfg8T/base.apk.hk8iIhG1.qqj 5174 /system/bin/dex2oat /data/user/0/com.nfrwxqmj.tixwgea/Gg9Gug9G6G/ItUfyqfo8gwfg8T/base.apk.hk8iIhG1.qqj 5085 com.nfrwxqmj.tixwgea -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 75 ip-api.com -
Reads information about phone network operator.
Processes
-
com.nfrwxqmj.tixwgea1⤵
- Loads dropped Dex/Jar
-
com.nfrwxqmj.tixwgea2⤵
-
/system/bin/dex2oat2⤵
- Loads dropped Dex/Jar
-
com.nfrwxqmj.tixwgea2⤵
-
toolbox2⤵
-
com.nfrwxqmj.tixwgea2⤵
-
/system/bin/sh2⤵
-
/system/bin/ndk_translation_program_runner_binfmt_misc2⤵
-
com.nfrwxqmj.tixwgea2⤵
-
/system/bin/sh2⤵
-
/system/bin/ndk_translation_program_runner_binfmt_misc2⤵
-
/system/bin/ndk_translation_program_runner_binfmt_misc3⤵
-
/system/bin/ndk_translation_program_runner_binfmt_misc1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.nfrwxqmj.tixwgea/Gg9Gug9G6G/ItUfyqfo8gwfg8T/base.apk.hk8iIhG1.qqjMD5
26aab411eb6c5a1e251166efd4c2721a
SHA12c0526a43d1f9a92989f61a6774cdb732e1c5de9
SHA256c219b5987ddef66ee39c5f8da4efb958bd9566f5a8c52a5fe699caffc2cae238
SHA512f39848d26e2c221574e9861c9c3af4885ac7c3f7e4f02cfa483932bb2cef78ad87aa72ad33e2f59660ef95167091f0d629d092c9bc6ca5fc564a21fc159a2693
-
/data/user/0/com.nfrwxqmj.tixwgea/Gg9Gug9G6G/ItUfyqfo8gwfg8T/base.apk.hk8iIhG1.qqjMD5
f13eed9e4b3440502301c86fcf2d2512
SHA1b72aa5c25142e5ddd83e7c602427fce61be9981f
SHA256c5a9d457cf1f5aead644a6ba26dcddf830c2ecc62007e637c93ff1aa00cf93c3
SHA512730444c8ab15906967f730f2f57c68738bf6ed714d8cee83e38f49722474e7be8923a16c34ba8d1a813d4c632a7861d6d58019b71c9f7672b2ce90841f7905a6