General
-
Target
e5b8818f512c406deadebf59e7293a68.apk
-
Size
2.3MB
-
Sample
220816-wdfr5acabr
-
MD5
e5b8818f512c406deadebf59e7293a68
-
SHA1
c5ab3af33be14561b7d5e8a64e195afb69a769d0
-
SHA256
5f49140c1c0e5be9ebf4cb760b3ae369672c02db11bf8fc73e59c48c9990a3dc
-
SHA512
359645aced616f2f76a6cbb1ae5f1cf9e58c2040abd9afc97cce5bc7e8bb08ac23d279db028d5eae98b8aa32e32627969dbcf500c69a0c8fcc82e92831a24775
-
SSDEEP
49152:Ixv0B2ZtolealfkIfTEtA7ik+w5JpM6qG5F6hLd+FgFdplxsQ5:Ixv82ZtoYYwwrp7qm+Ld+OnlxJ
Static task
static1
Behavioral task
behavioral1
Sample
e5b8818f512c406deadebf59e7293a68.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
e5b8818f512c406deadebf59e7293a68.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
e5b8818f512c406deadebf59e7293a68.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Extracted
hydra
https://maxnote.site
Targets
-
-
Target
e5b8818f512c406deadebf59e7293a68.apk
-
Size
2.3MB
-
MD5
e5b8818f512c406deadebf59e7293a68
-
SHA1
c5ab3af33be14561b7d5e8a64e195afb69a769d0
-
SHA256
5f49140c1c0e5be9ebf4cb760b3ae369672c02db11bf8fc73e59c48c9990a3dc
-
SHA512
359645aced616f2f76a6cbb1ae5f1cf9e58c2040abd9afc97cce5bc7e8bb08ac23d279db028d5eae98b8aa32e32627969dbcf500c69a0c8fcc82e92831a24775
-
SSDEEP
49152:Ixv0B2ZtolealfkIfTEtA7ik+w5JpM6qG5F6hLd+FgFdplxsQ5:Ixv82ZtoYYwwrp7qm+Ld+OnlxJ
Score10/10-
Hydra payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-