Analysis
-
max time kernel
2348004s -
max time network
67s -
platform
android_x64 -
resource
android-x64-20220621-en -
submitted
22-06-2022 15:03
Static task
static1
Behavioral task
behavioral1
Sample
4556936d8864a03fcd3586f6ada4fbce.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
4556936d8864a03fcd3586f6ada4fbce.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
4556936d8864a03fcd3586f6ada4fbce.apk
Resource
android-x64-arm64-20220621-en
General
-
Target
4556936d8864a03fcd3586f6ada4fbce.apk
-
Size
3.1MB
-
MD5
4556936d8864a03fcd3586f6ada4fbce
-
SHA1
11e99f8c4255e1289fa99a6bf04efee9a487d85b
-
SHA256
d42c56e4bb96482a14b6b432737d73f39a991855feb118b1674c769d095baa66
-
SHA512
a01fa6ad24e2699dd731053cbe7a3aa9b71d3a5f5abe5d26ae6717d92a5aa934f228e58bb81a154a275933ec7277fadd762cd35fa36dad97148772b422a7873a
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra Payload 1 IoCs
resource yara_rule behavioral2/memory/6035-0.dex family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.wedding.turtle/app_DynamicOptDex/QiH.json 6035 com.wedding.turtle
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD535fd7ff1361f614892a8fdf2582e239f
SHA17ead54b758c0aeadd81432c00d60e54a672016d6
SHA256cd0c234b39fbe74538ed85ca1116a7658edc15997056cba2cccc1aeef1abf694
SHA5127abd217d0ce9d60e953f41c6f2a0ba2d276cbe4067ddbd50aea8f958f2f1bf16f73494c80ea954208e2d06296a5e1cc471c57356374b9487f153c9dd6248effe
-
Filesize
5.0MB
MD5b42b9d7a408b0e1e52109b9695f2e6eb
SHA1beff86894edf19b07374ec23339d633bafcc103f
SHA256f461b5a0ac8dc0516a71c6ea2306abfd876d9324bc11adec950456255e7540f1
SHA5127c726032d649d76a1c3a7b9e8c6ab6845bb2c3561933202a4748400d39e72f5c1f816cc2a1445a8bc15c08049eae3e171442b3880e42a09a74b3981c071f2603