General
-
Target
8686312c317336f0bb7b8e8344d4c98f.apk
-
Size
2.4MB
-
Sample
220816-vdwmxaeeh6
-
MD5
8686312c317336f0bb7b8e8344d4c98f
-
SHA1
bd4a06863d1241aab3cf9edf5316c1501d2b2f95
-
SHA256
5ddd49654d77b13a19cec37ab0db53095355be864405ca7fe10536813217d189
-
SHA512
fa7e9bc51fbb2215c066b3a1d00d6178f5bd84e5c0ee29507753d7b52dfb1f0a91f10d668bd23c00565a5df8df3ef3d4035e78f7f891aa879955e4069e5780da
-
SSDEEP
49152:3ZyMHFd2lD4BspO1OkoYVmLxxeqXIn+zoxZ3Q3FUq50miuDI:3ZyaFdWDPpODwLKPsqQVz6wDI
Static task
static1
Behavioral task
behavioral1
Sample
8686312c317336f0bb7b8e8344d4c98f.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
8686312c317336f0bb7b8e8344d4c98f.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
8686312c317336f0bb7b8e8344d4c98f.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Extracted
hydra
https://notpro.top
Targets
-
-
Target
8686312c317336f0bb7b8e8344d4c98f.apk
-
Size
2.4MB
-
MD5
8686312c317336f0bb7b8e8344d4c98f
-
SHA1
bd4a06863d1241aab3cf9edf5316c1501d2b2f95
-
SHA256
5ddd49654d77b13a19cec37ab0db53095355be864405ca7fe10536813217d189
-
SHA512
fa7e9bc51fbb2215c066b3a1d00d6178f5bd84e5c0ee29507753d7b52dfb1f0a91f10d668bd23c00565a5df8df3ef3d4035e78f7f891aa879955e4069e5780da
-
SSDEEP
49152:3ZyMHFd2lD4BspO1OkoYVmLxxeqXIn+zoxZ3Q3FUq50miuDI:3ZyaFdWDPpODwLKPsqQVz6wDI
Score10/10-
Hydra payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-