Analysis
-
max time kernel
1564377s -
max time network
172s -
platform
android_x64 -
resource
android-x64-20220621-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220621-enlocale:en-usos:android-10-x64system -
submitted
02-08-2022 06:21
Static task
static1
Behavioral task
behavioral1
Sample
genryFok_build.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
genryFok_build.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
genryFok_build.apk
Resource
android-x64-arm64-20220621-en
General
-
Target
genryFok_build.apk
-
Size
3.1MB
-
MD5
0474a037018fdd6993258e197c38ae5b
-
SHA1
4e0674b3ff4597ef2c31a26ec66bad7bad072e5d
-
SHA256
1da384d97e0706d3478453fdf89a9b1f255aeeead52b166f53355c2dbfcfe50a
-
SHA512
ac7e95e92c73384c3a088ad0fc4caac8018f463d3d6b9686092184cc9d8d81d56b70693c661de88d566e99b898bdb37662650a0e1e2b23dd74c517e7f950cab6
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral2/memory/5058-0.dex family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.brother.lesson/app_DynamicOptDex/in.json 5058 com.brother.lesson -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Reads information about phone network operator.
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5a11c92f1e7344b9555b4b2e559e2a209
SHA1c156f2f66f523195fa6e6cfeefdccdc62302661b
SHA25634600142576b4c622fc37ea793176e09f4944bead0498b1bef5205c0472af291
SHA512dac53562f375feec37ff770d0dbb2bbd13c4f2f3d75123912ebeb646e736bb6ba2bf251242359d51886d90e0f67a369b2c9d8061b0c37b4479356056f97178c0
-
Filesize
5.0MB
MD5816148abda5e36c837db959e31d56dfb
SHA12d4842187e25ee764fc08b40caefaea112010688
SHA25657d073f900d017f99113deaa40faad9018a9e1370d9285d1a442f3d692631672
SHA5120733f6a5b3ec75fb7d6eadf0c094b2b76e1d9b254a8d0b89fc83f1c61edf08b856dec1c7839ad8e6f66118c39aee8fd48748f452079ef56eafcaa59a76b09441