Analysis

  • max time kernel
    1171967s
  • max time network
    160s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    01-03-2022 14:18

General

  • Target

    psk.apk

  • Size

    7.1MB

  • MD5

    975f5eff0e960994608742678ca70208

  • SHA1

    e311d4f346b363665c462658889ddfb73c4dd8da

  • SHA256

    64d0257352222162db7125f27e4ef16958c515326adab554d50698a1685e46ef

  • SHA512

    7a2fbbb412504f431d6fdbd1f3390ab725eb7cd5ae37afaccf604d0d329ab6cecba45c90d48ef722a680026eac13356987ba4fdf85845c2cb689f0fce8119622

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Checks Qemu related system properties. 1 IoCs

    Checks for Android system properties related to Qemu for Emulator detection.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

Processes

  • com.otdvrvmj.hqlhtve
    1⤵
    • Checks Qemu related system properties.
    • Loads dropped Dex/Jar
    PID:3811
    • com.otdvrvmj.hqlhtve
      2⤵
        PID:3884
      • toolbox
        2⤵
          PID:3884
        • com.otdvrvmj.hqlhtve
          2⤵
            PID:3907
          • /system/bin/sh
            2⤵
              PID:3907

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • /data/user/0/com.otdvrvmj.hqlhtve/ThgGhuajff/8g6IHGhjgU8fygI/base.apk.Gkjhp8h1.GIf

            MD5

            55f25a5cc0e028abdd4a93867fde6992

            SHA1

            6cac052b3d9eaf2debfe2e532a60d04f6d8d3175

            SHA256

            277e1cb2b759b55e5edd4a4d0507da0409c7f8ff3f6b29e4fed846e517fef1dd

            SHA512

            b394900d1725a95fd0ac29ad9bf2da9b4acd2dbb99ddb6fcd2c457b468600da850d0341269c617f835cba436757dd5d15a374593ff467a73f3488141719c2584