Analysis
-
max time kernel
1171967s -
max time network
160s -
platform
android_x64 -
resource
android-x64 -
submitted
01-03-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
psk.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
psk.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
psk.apk
Resource
android-x64-arm64
General
-
Target
psk.apk
-
Size
7.1MB
-
MD5
975f5eff0e960994608742678ca70208
-
SHA1
e311d4f346b363665c462658889ddfb73c4dd8da
-
SHA256
64d0257352222162db7125f27e4ef16958c515326adab554d50698a1685e46ef
-
SHA512
7a2fbbb412504f431d6fdbd1f3390ab725eb7cd5ae37afaccf604d0d329ab6cecba45c90d48ef722a680026eac13356987ba4fdf85845c2cb689f0fce8119622
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Checks Qemu related system properties. 1 IoCs
Checks for Android system properties related to Qemu for Emulator detection.
Processes:
com.otdvrvmj.hqlhtvedescription ioc process Accessed system property key: qemu.gles com.otdvrvmj.hqlhtve -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.otdvrvmj.hqlhtveioc pid process /data/user/0/com.otdvrvmj.hqlhtve/ThgGhuajff/8g6IHGhjgU8fygI/base.apk.Gkjhp8h1.GIf 3811 com.otdvrvmj.hqlhtve -
Reads information about phone network operator.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
55f25a5cc0e028abdd4a93867fde6992
SHA16cac052b3d9eaf2debfe2e532a60d04f6d8d3175
SHA256277e1cb2b759b55e5edd4a4d0507da0409c7f8ff3f6b29e4fed846e517fef1dd
SHA512b394900d1725a95fd0ac29ad9bf2da9b4acd2dbb99ddb6fcd2c457b468600da850d0341269c617f835cba436757dd5d15a374593ff467a73f3488141719c2584