Analysis
-
max time kernel
4254585s -
max time network
160s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
06/04/2022, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
bawag.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
bawag.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
bawag.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
bawag.apk
-
Size
3.5MB
-
MD5
d61a1d957f3f509220adcd1e7f975153
-
SHA1
df6c31c0e052b861b73e12dbf15942a9d5aa7770
-
SHA256
6615ce1e651653426e799bc5e07823ed6628c89fea5e7ee372d7440968ef028e
-
SHA512
5574cba6fbe072945a1e00f5889ee9a6fde336002e636046a8f6c4a865981465bf37f67213a3c8a41c65a53916da9b6607c5441ed83969ffee358e931c24be5c
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra Payload 1 IoCs
resource yara_rule behavioral2/memory/6284-0.dex family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tent.spawn/app_DynamicOptDex/uprHpof.json 6284 com.tent.spawn -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD549d21fd4250c6d1f0761211558ddbb10
SHA1cf6645c8a28939dd6c02dc7856348982fca86a52
SHA256d9f1226c0678fb432b6cc7b25bddcdd32c09895183afeadb5c0f686410921773
SHA512bc48d91a959c374a16f9ca9946320d947230aaedc1e15526f3048272e146fd65e1362e1f3c5e3a726885a5ce1afe0d22c746775490abd8ebadc91665fffcb5cc
-
Filesize
5.0MB
MD5412826ee6d6fab98a5471008a2cd1118
SHA117ae43b5a9128d4df9c140833bf696c42bf04ccb
SHA25626fdc35c4216c1b7a810ac2e341630cca4b5faa92561df7c42ccb6ea408a8d7f
SHA5128f2c5b00a730a114384f7250d2a728283909da3849bdc6f2a222891a318db520fa414ff03135afb07bf3ef44aa5af8d5efb716f1a74cf4221a5c89321d963678