General
-
Target
Google_chrome.apk
-
Size
2.5MB
-
Sample
220728-hvqrrsdgbl
-
MD5
2cd5f2c9f3bf4b0070479446a6c38597
-
SHA1
f3efb1aa48d6c6e5c75d977c3b2712ee862505cb
-
SHA256
734605a1f30870dd8fb211c8afd53afa71b3fcb138094f589098d799e589e99b
-
SHA512
75a958e097472b88d124c1ce98cbdc3255bca13ddbb1784def9d98ab2fab965e3281777378af08b17f13e64c887a5496832c7cbc95cfd47ce0af382e90a186c6
Static task
static1
Behavioral task
behavioral1
Sample
Google_chrome.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
Google_chrome.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
Google_chrome.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Extracted
hydra
https://notpro.top
Targets
-
-
Target
Google_chrome.apk
-
Size
2.5MB
-
MD5
2cd5f2c9f3bf4b0070479446a6c38597
-
SHA1
f3efb1aa48d6c6e5c75d977c3b2712ee862505cb
-
SHA256
734605a1f30870dd8fb211c8afd53afa71b3fcb138094f589098d799e589e99b
-
SHA512
75a958e097472b88d124c1ce98cbdc3255bca13ddbb1784def9d98ab2fab965e3281777378af08b17f13e64c887a5496832c7cbc95cfd47ce0af382e90a186c6
Score10/10-
Hydra payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-