Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4281695s -
max time network
124s -
platform
android_x86 -
resource
android-x86-arm-20220310-en -
submitted
06/04/2022, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
easybank.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
easybank.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
easybank.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
easybank.apk
-
Size
3.3MB
-
MD5
c81e236e8e7445375ee40d8e3f327873
-
SHA1
43fd1ac04a1793ceb60061c402c3f2bab67daa1c
-
SHA256
9939bea82bef38dff91be0182d26c13694dec687d1b8971bb2924076b89646f1
-
SHA512
f9a385117ca8b1c2a407c9d3e2bb24dd084b595a6e35f1be5c6526b872bdad215b2d365cb5e2b86a2abdde1b5f12adef515a1f44d78ae4a15a1de84f9fe36a48
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra Payload 2 IoCs
resource yara_rule behavioral1/memory/5237-0.dex family_hydra behavioral1/memory/5207-0.dex family_hydra -
Makes use of the framework's Accessibility service. 2 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.weapon.fox Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.weapon.fox -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.weapon.fox/app_DynamicOptDex/WpA.json 5237 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.weapon.fox/app_DynamicOptDex/WpA.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.weapon.fox/app_DynamicOptDex/oat/x86/WpA.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.weapon.fox/app_DynamicOptDex/WpA.json 5207 com.weapon.fox -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Reads information about phone network operator.
Processes
-
com.weapon.fox1⤵
- Makes use of the framework's Accessibility service.
- Loads dropped Dex/Jar
PID:5207 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.weapon.fox/app_DynamicOptDex/WpA.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.weapon.fox/app_DynamicOptDex/oat/x86/WpA.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:5237
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5040d387a5d2e089ff270f01807791ee6
SHA166651e50bf15297333663fa27c258a2691d80599
SHA256c41f3a34e79d81596434b7ba2b59c6282d24cc99460849f4db9ef48379c153c9
SHA512f12a9fdc32ab1faf97a981d551d8d7367a31a0e75670df25fecd27e54fe33bfaf4289961b6e5d7920a69d68ebfde1f1e91dc18ed99f196ca6a1483e332627efc
-
Filesize
5.0MB
MD58c100bded1bb4bbfebfe1bf18a9e391a
SHA1493de1bf579f86024446ddafb47df8b8ba90f5f9
SHA256fd15e72642285373d06fe9a7eeac724cc179064a4c46031e69eb32bdf878efd9
SHA512a0149e8a5be009b4ad985dc3a6bd3e0e25c13966f56059c5fde2d223945a775b2879fae851f185589f53e8d21f7f6cda19295ba7923634d70fc3f9a05945d78c
-
Filesize
5.0MB
MD50143e9febfc6d0ff7d33bfc457c46384
SHA18dc57856294c219551d9806f40f8048e04e630fe
SHA256a03aa26bbe25cf37773ed9378745a675a775c1a27c1c9c13f4eecab4117d8678
SHA512631112637bcaf70c765efe3697bd1f13dc00647829d1a6f80facce0a32054c0e83eeb5fc06b73e04f983f72effac24e6b921909f550f90e5391f995a7f47279a
-
Filesize
422B
MD5d677c5f4f107f72272e4313a23372507
SHA141400d3e8b23e61de2f7078005c87852b7b5ed4a
SHA256924b9034d71e7a7cb105c1fc9731b0ae25690db2f4fc50fb3e1e0fb3db9c2e54
SHA512d36168a2eaf2167002d99500ba906bd7fb6cbdbcf14a2d257dabfdd8c271783ed95e827dcd96571813e4d67f5a78cc9e70598c7b6257af9127f110ef13d9f14a
-
Filesize
3.9MB
MD59893523429f07b4ddc82e4133ff6603d
SHA1ff83ad73de7672c77edf8888f4b241642c7c90f7
SHA256d79a14e1b685ec9cfb3e9a489b9650e4092eccc468c9eef4222765857e83d96e
SHA5122346a2d1616894b350fdcc6833f33a16bc031809ce80160f35af78b05a9c867d722979cdb3725c5bcddaa54518c58d88b0320a20da5f752a03c2c4758b84126a
-
Filesize
2.2MB
MD53a6750bc0ab780292491c6a2b2bdc2e8
SHA1b1cdbfeb7c88f82ef3b5289cafeed1321fa4693f
SHA25626e2b88c992873131ba6422d6eb8f6ced94add2f5abfdbe3dcca4cbd79861d67
SHA512f7a1c555b8fdea9a132367d2c0d6396c0045bf13375a3b64b686f7ea34b8ed6868d9253ca1902fbd2538994482f363045be771596d3a2c0a6a017b03903b36c7
-
Filesize
6.7MB
MD58f75c0f064ae808474d98334419374b2
SHA12541a68db820e825e40f8955baf9148113afbc49
SHA25660c73335d1aca9219ec0c355e201d46160549b47534f1074751d4f0dc0f2d506
SHA51241439bf307f77343e123aedf83bed1ad2d77faaeecdd9daa2c447d1a2b8e6bb44aca861a950161a0298f7150c37480e5d22126a466025de8f10c9d083e96e58f
-
Filesize
6.9MB
MD55183e07a25ec7654bbd9405b5f1a4c75
SHA125057eeb42ff82668cd49b9e1bcfc39b2229955d
SHA2564119996e6e2c6a57ad245c40368732972eeaf40bc9e2c22c396d69afeb4bea15
SHA512a1bbd42ff89c21025404185e28ffea01906860b41ae6bb6e5d725ef28b8131e9501da7798ff0807f300cf018132e06c176332c1aa31939676bdf0cc08a3f1194
-
Filesize
123B
MD5882a5c7bb55ad342d352770ad1a04c90
SHA1b048a9cf4926febbed82f2804207bd7576a8e8e0
SHA256caa24da47c90ed4a260ee260ecd1dab3f8937688e82ae0a3705703b38da43278
SHA5129f3863f873fdb5625d251d0bd1cdd52f683844ead8e458571e21af4f65c947c2da0cdb3036ca4e1d9d7ca4cccbb097aaea1e253604b99a3965d4a2c4f04f97ec