Analysis
-
max time kernel
4255309s -
max time network
175s -
platform
android_x64 -
resource
android-x64 -
submitted
15-02-2022 13:44
Static task
static1
Behavioral task
behavioral1
Sample
bawag.apk
Resource
android-x86-arm
android_x86
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
bawag.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
bawag.apk
Resource
android-x64-arm64
android_x64
0 signatures
0 seconds
General
-
Target
bawag.apk
-
Size
6.2MB
-
MD5
4212125ef94304e3dd9659186204fc5c
-
SHA1
c807313be5dd0fc754ba913d1b7e6a40bd8a663f
-
SHA256
507f55a17a03490978c09690fc2f11a900b52ff7bc4a73f8af9ea9c586b83d75
-
SHA512
709c3d2975b5c1b4740bd80e4b9a8a10d97e584b9cfe75185b5d4fb2f78fa2868bafbc328a2234786226233a54826eff25f929d2dc7e27d70300c7ce50d8f21d
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Checks Qemu related system properties. 1 IoCs
Checks for Android system properties related to Qemu for Emulator detection.
description ioc Process Accessed system property key: qemu.gles com.nfrwxqmj.tixwgea -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.nfrwxqmj.tixwgea/Gg9Gug9G6G/ItUfyqfo8gwfg8T/base.apk.hk8iIhG1.qqj 3850 com.nfrwxqmj.tixwgea -
Reads information about phone network operator.