Analysis
-
max time kernel
4071101s -
max time network
133s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
23-05-2022 20:39
Static task
static1
Behavioral task
behavioral1
Sample
fffffffff.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
fffffffff.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
fffffffff.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
fffffffff.apk
-
Size
3.1MB
-
MD5
0fdca6790eaeecfa67508b31a429e424
-
SHA1
ff05f9fe48d2c4f82d91dbb601ae0483311fe86c
-
SHA256
e3ccad0c792bb1fef21740837b9049bb91106bdc813948ce7d3f9d8984edda7d
-
SHA512
b65988b15783a77cf23ec6c9836df5e40efeb7d1d8280b5a54f23e98c665da228adbfa8992b5d681966c7ead67f2e163ca368766e53926b71fc1da4085dd2d4e
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra Payload 1 IoCs
resource yara_rule behavioral2/memory/6363-0.dex family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.solve.hungry/app_DynamicOptDex/NmHLUYO.json 6363 com.solve.hungry -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5f6a88e10b34f9bb7a9316868e4607ad4
SHA192b30897951506fc49326744623711571fb490a0
SHA256072ad6d0030f39d35f4402b6a3c7511475defc24ea1e3e21693dec158f29b3e9
SHA5120b6a7ebbf3f3906ddffc1fbec84fa2382dff306274d4db94c07a76288a664fd813c96b0e83b89189c271918fbd0b70c4bfcb5c912b14c7435aa1920ba7632390
-
Filesize
5.0MB
MD5cf8f8432d6e5ee6e6fe8c9b19654d703
SHA1edf634e480c732e92ae04d2650b8bd97ac73a7c0
SHA25655c4cf23d17bcc3187bc0464b6b4a17d305851517cf2c1f757f9f24bb11d2370
SHA5129e26dd73787614c3829be47bf9f01ff618cac2f6c1ac7bf0d0942820e00d5ecffa85b98da78d49a061c5fc10e28eb2c528d56a04db20a4b9b71a03d16fb3e766