Analysis
-
max time kernel
1564178s -
max time network
160s -
platform
android_x64 -
resource
android-x64-arm64-20220621-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220621-enlocale:en-usos:android-11-x64system -
submitted
02-08-2022 06:19
Static task
static1
Behavioral task
behavioral1
Sample
2_Chrome_obf.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
2_Chrome_obf.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
2_Chrome_obf.apk
Resource
android-x64-arm64-20220621-en
General
-
Target
2_Chrome_obf.apk
-
Size
2.7MB
-
MD5
95a7f34f3e34c98298c864a530d64346
-
SHA1
4a5e09d2c3bc795e801b6cbe090cc384573f2a42
-
SHA256
2ae09bef7398cbf1999263a09949ec9e6baca4d25852a2cf758e546b2f4658ce
-
SHA512
87c7d2340f25b78f5ca7798b3ee548b5168579ba7b2d7a5bf7c01720d5fe92e3dd5f3f0347ec32b87532c417e4f3effc9d6b15fc04db494ddb08b5510e68f332
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral3/memory/5078-0.dex family_hydra -
Makes use of the framework's Accessibility service. 2 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.enter.craft Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.enter.craft -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.enter.craft/app_DynamicOptDex/KnywGI.json 5078 com.enter.craft -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5d278cca23059772e7b108fd3a4d70b7c
SHA165d078fa5282d0501144238069eb39833bde3f71
SHA2566467ec3d2f3ae7d5c0c19c68501577c69c8b3cccafc11942ffec42a0d42b8455
SHA512deee6867ca03e23770c28a3aa7a2c5ea6c7efe78f7be7146acb24148cf2b4e460fe8f29a246c176403e5ccade7546b57cc49ed02e53afc7da70ca8f24ec8341d
-
Filesize
5.0MB
MD5895c7a0b1184da3d55f9ac95d8757bbc
SHA17f7fe3ce3bf8a3be429f8b7412444865946a2147
SHA2567e315f0ad29a1da62d4860a14dd2a1fa10564b60b3b9f1699e9105e19293a346
SHA512fb7d39a867e7b0dc0f9f3a9fe508f1f3f4f6bb7bc9f7abe0ade6a9e3d0a1b15e97ffba55799ff0efc0fb31b273d8bee4e00467f59ec870a5ca671a2c1b711a9f