Analysis

  • max time kernel
    26324s
  • max time network
    160s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    16-02-2022 08:04

General

  • Target

    psk.apk

  • Size

    6.2MB

  • MD5

    24f7fd773edcd9fd9440414921a13583

  • SHA1

    f1e9f0c83ee704d66ae6b263f96c918d82ea5a6e

  • SHA256

    5ccc7291adb2a897dd3d0d273fb79bbfa98877ee8553b919813672f8cb02f893

  • SHA512

    b197fc66f077e1b2c3d192cf5891f7daa2f20e5846cbecd8598b3fdf0b82814b18dcbf0d8baf5606a7d0f54bde2169be15e5c36a0b18f6a258d3b6a5cec0f7b7

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Checks Qemu related system properties. 1 IoCs

    Checks for Android system properties related to Qemu for Emulator detection.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

Processes

  • com.zmmiwukx.gtpxqut
    1⤵
    • Checks Qemu related system properties.
    • Loads dropped Dex/Jar
    PID:3812
    • com.zmmiwukx.gtpxqut
      2⤵
        PID:3884
      • toolbox
        2⤵
          PID:3884
        • com.zmmiwukx.gtpxqut
          2⤵
            PID:3904
          • /system/bin/sh
            2⤵
              PID:3904

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads