Analysis
-
max time kernel
26329s -
max time network
161s -
platform
android_x86 -
resource
android-x86-arm -
submitted
16-02-2022 08:04
Static task
static1
Behavioral task
behavioral1
Sample
psk.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
psk.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
psk.apk
Resource
android-x64-arm64
General
-
Target
psk.apk
-
Size
6.2MB
-
MD5
24f7fd773edcd9fd9440414921a13583
-
SHA1
f1e9f0c83ee704d66ae6b263f96c918d82ea5a6e
-
SHA256
5ccc7291adb2a897dd3d0d273fb79bbfa98877ee8553b919813672f8cb02f893
-
SHA512
b197fc66f077e1b2c3d192cf5891f7daa2f20e5846cbecd8598b3fdf0b82814b18dcbf0d8baf5606a7d0f54bde2169be15e5c36a0b18f6a258d3b6a5cec0f7b7
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oatcom.zmmiwukx.gtpxqutioc pid process /data/user/0/com.zmmiwukx.gtpxqut/fGj88II9af/je9iIIfIIfTogfg/base.apk.i8UToII1.fGU 5138 /system/bin/dex2oat /data/user/0/com.zmmiwukx.gtpxqut/fGj88II9af/je9iIIfIIfTogfg/base.apk.i8UToII1.fGU 5077 com.zmmiwukx.gtpxqut -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 73 ip-api.com -
Reads information about phone network operator.
Processes
-
com.zmmiwukx.gtpxqut1⤵
- Loads dropped Dex/Jar
PID:5077 -
com.zmmiwukx.gtpxqut2⤵PID:5138
-
/system/bin/dex2oat2⤵
- Loads dropped Dex/Jar
PID:5138 -
com.zmmiwukx.gtpxqut2⤵PID:5447
-
toolbox2⤵PID:5447
-
com.zmmiwukx.gtpxqut2⤵PID:5614
-
/system/bin/sh2⤵PID:5614
-
/system/bin/ndk_translation_program_runner_binfmt_misc2⤵PID:5614
-
com.zmmiwukx.gtpxqut2⤵PID:5685
-
/system/bin/sh2⤵PID:5685
-
/system/bin/ndk_translation_program_runner_binfmt_misc2⤵PID:5685
-
/system/bin/ndk_translation_program_runner_binfmt_misc3⤵PID:5738
-
com.zmmiwukx.gtpxqut2⤵PID:5766
-
toolbox2⤵PID:5766
-
/system/bin/ndk_translation_program_runner_binfmt_misc1⤵PID:5748
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0dfbbe32133a0ccf851c59e8a6501419
SHA152af9bc9d5f9bf39c5721fbcd444e26f32a2029b
SHA2561d621e51ada0b503fb5929d01c1e37e6639459483e08244ebab0d7df43ceed15
SHA512355a3902c5e4392e2546dbb79aaa4381247fc7e4e0cff0d8d9e6fa2d4c3682c2059480be11c7394005972c101564adfd2a7a1bf27d891cfc2c9f5a1c367f0f38
-
MD5
4d9927457b7cca7b3211a05faf140400
SHA16317feb16e912d3972dbcd0b0f582ef47e130e80
SHA2560d4084dec89be56748478048ef2735821048826da510f9e2fc44f528f992904a
SHA512768507c2988c38cb4b3c3302fb6d89fb633ba46e258cd8ee18c7bec1b4c1efa7c38a663a33ff0eb14d677008cc141dfab04abbaaecfef02ea5b318de6371fc49