Analysis
-
max time kernel
3681577s -
max time network
150s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
19-05-2022 08:27
Static task
static1
Behavioral task
behavioral1
Sample
FlashPlayerV1.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
FlashPlayerV1.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
FlashPlayerV1.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
FlashPlayerV1.apk
-
Size
2.7MB
-
MD5
dc09a6ce2314a97a4515df60a3628daa
-
SHA1
f00e5ddd740e8bfc996a03258efe4fd9445afc2d
-
SHA256
b7440319d58586bd84fcbce0573ec9c424fc5e8203f16a45bc689b035561d22c
-
SHA512
8fbab5efe65d29961f1c91c0499578d531ef5651ca7d70d9e28f365318408fb29cb1758e68c1364236f3c8860d9c0963eaa703fcb75de27bf0763e49f99af40d
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra Payload 1 IoCs
resource yara_rule behavioral2/memory/6286-0.dex family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.people.charge/app_DynamicOptDex/nWfmsQ.json 6286 com.people.charge -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5e1a868e3f1bf499163b68cf3d32f5f65
SHA14a9dd5872949fcedb4a6080c8b0563b08108b148
SHA25616d26baabf2db6ab8c9a628b71402556319aa86cebb39bab7ddf058cf99520c6
SHA512db410ac9acadbd77bad6fb92e5934322d964b4d8b45af1755e705622b8bc82e4896b8c233aaa73635b3134b7476fc9e339dae0bfba52460da38b2a5381423c59
-
Filesize
5.0MB
MD56bd544d275c8f049391a46371d03862d
SHA106c6091dab4fc3e91d62f1ae87a8a16356f234f1
SHA2564079e84dbc452d7a2bfba40b54dec85b6d4803566aef777df3d58ba073906db8
SHA512f29eea4dbeb32bd52cdfcb493124c93c923f34a263ae7c61ab4b5f6804af48bec0bf78b65a63e783f0fb195c06d2cb398933399ab92c60327888e3367c436758