Analysis
-
max time kernel
3451288s -
max time network
166s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
16-05-2022 16:23
Static task
static1
Behavioral task
behavioral1
Sample
5cb252c70a223901b3005816ddd87a0e7e67f32bb44af63cb6dc1482f9bcd577.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
5cb252c70a223901b3005816ddd87a0e7e67f32bb44af63cb6dc1482f9bcd577.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
5cb252c70a223901b3005816ddd87a0e7e67f32bb44af63cb6dc1482f9bcd577.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
5cb252c70a223901b3005816ddd87a0e7e67f32bb44af63cb6dc1482f9bcd577.apk
-
Size
4.6MB
-
MD5
04740989c14ab33a2ff2696db96d0c1f
-
SHA1
997b7fa513c2c6ecce1247f129da6680e8a4c97b
-
SHA256
5cb252c70a223901b3005816ddd87a0e7e67f32bb44af63cb6dc1482f9bcd577
-
SHA512
fa1a714626215f057007bc5759b5ba6b0108da6c08f331643322ff05195ffa0929c1be2377e612c06fe427e9c643611eb6805251ef29fe3fbacd18cdcf117a28
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra Payload 2 IoCs
Processes:
resource yara_rule /data/user/0/wjhtcnrkkar.lubuxqtnmzucraly.xasiafinjzlmxme/app_DynamicOptDex/TD.json family_hydra /data/user/0/wjhtcnrkkar.lubuxqtnmzucraly.xasiafinjzlmxme/app_DynamicOptDex/TD.json family_hydra -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
wjhtcnrkkar.lubuxqtnmzucraly.xasiafinjzlmxmeioc pid process /data/user/0/wjhtcnrkkar.lubuxqtnmzucraly.xasiafinjzlmxme/app_DynamicOptDex/TD.json 6018 wjhtcnrkkar.lubuxqtnmzucraly.xasiafinjzlmxme /data/user/0/wjhtcnrkkar.lubuxqtnmzucraly.xasiafinjzlmxme/app_DynamicOptDex/TD.json 6018 wjhtcnrkkar.lubuxqtnmzucraly.xasiafinjzlmxme -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5f010ee9359c9f821774826bf6bc7455a
SHA1bdff7af978ec5e7bde75e2bcd7ee61d7796d26fc
SHA256563ddf7dc401b739398eb480663a0ca44c7592b189e51fe82539349ef1670f98
SHA5127c4977760e5829b572d93cf4906bc86daabaa2f2f2d54b1fd83cd2eadb71b2087c8ce12c2de795ef2b8f8f38790b8b8a723d1f9e7487cbd9e104974e054c0f14
-
Filesize
2.7MB
MD5bd8a27efbb8d2a97b998e3203f746088
SHA1ac6748fd08597745f5fba12dba7d34aac2885f30
SHA256cb624aaa4569cdffc9f9706638a90d33a6bb180ad31cb7a9a5f238ca99e32919
SHA51274ebcceda9519767dca9dc84e3d98861816c2cdbf399dcf1cecb34cc1814d615e5341bf5cd66d07a1c9d104790c1bd594452c6449970c9a6f7c0c51124593da4
-
Filesize
2.7MB
MD5bd8a27efbb8d2a97b998e3203f746088
SHA1ac6748fd08597745f5fba12dba7d34aac2885f30
SHA256cb624aaa4569cdffc9f9706638a90d33a6bb180ad31cb7a9a5f238ca99e32919
SHA51274ebcceda9519767dca9dc84e3d98861816c2cdbf399dcf1cecb34cc1814d615e5341bf5cd66d07a1c9d104790c1bd594452c6449970c9a6f7c0c51124593da4
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e