Analysis
-
max time kernel
1171967s -
max time network
160s -
platform
android_x64 -
resource
android-x64 -
submitted
01-03-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
psk.apk
Resource
android-x86-arm
android_x86
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
psk.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
psk.apk
Resource
android-x64-arm64
android_x64
0 signatures
0 seconds
General
-
Target
psk.apk
-
Size
7.1MB
-
MD5
975f5eff0e960994608742678ca70208
-
SHA1
e311d4f346b363665c462658889ddfb73c4dd8da
-
SHA256
64d0257352222162db7125f27e4ef16958c515326adab554d50698a1685e46ef
-
SHA512
7a2fbbb412504f431d6fdbd1f3390ab725eb7cd5ae37afaccf604d0d329ab6cecba45c90d48ef722a680026eac13356987ba4fdf85845c2cb689f0fce8119622
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Checks Qemu related system properties. 1 IoCs
Checks for Android system properties related to Qemu for Emulator detection.
description ioc Process Accessed system property key: qemu.gles com.otdvrvmj.hqlhtve -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.otdvrvmj.hqlhtve/ThgGhuajff/8g6IHGhjgU8fygI/base.apk.Gkjhp8h1.GIf 3811 com.otdvrvmj.hqlhtve -
Reads information about phone network operator.