Resubmissions
31-08-2022 14:33
220831-rw9eyafegp 1028-07-2022 07:03
220728-hvqrrsdgbl 1025-07-2022 22:23
220725-2awxtsbdam 10Analysis
-
max time kernel
4099127s -
max time network
63s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
31-08-2022 14:33
Static task
static1
Behavioral task
behavioral1
Sample
Google_chrome.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral2
Sample
Google_chrome.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
Google_chrome.apk
-
Size
2.5MB
-
MD5
2cd5f2c9f3bf4b0070479446a6c38597
-
SHA1
f3efb1aa48d6c6e5c75d977c3b2712ee862505cb
-
SHA256
734605a1f30870dd8fb211c8afd53afa71b3fcb138094f589098d799e589e99b
-
SHA512
75a958e097472b88d124c1ce98cbdc3255bca13ddbb1784def9d98ab2fab965e3281777378af08b17f13e64c887a5496832c7cbc95cfd47ce0af382e90a186c6
-
SSDEEP
49152:JsxNWnuixVhcnaoipPckKfNFBwA3QMhmGU6Os0y2NvjxwLw9:saujndwylFBwAASlUTs0ZrW8
Malware Config
Extracted
hydra
https://notpro.top
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral1/memory/4923-0.dex family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.spring.birth/app_DynamicOptDex/eqs.json 4923 com.spring.birth -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 47 ip-api.com 49 ip-api.com -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD50ed0faa66716f9a81c675b68f8398f1e
SHA13528062265d1fe1e9c443f5264b45e763d476399
SHA256593ec8376adf97487a6f8115b1bb0b47e0891a1020265da569457fb275f89a14
SHA512bda56c78c7386773392cc60d0efc69550d4e262b7f615f4e13226beaaac56d23c0c9fda88b68b870a4b4c0b7420101102f04ce59fb6c8144555b118d15a02e33
-
Filesize
3.6MB
MD59a6058c280f8625e6fbcdaa29e3bd2c0
SHA144c031dba6a194cccf12f3c3fdd7fafd0eddd656
SHA25612e8a559756893eda5fb2b6eb4ea7080acf1469738edad6ab9c82bda80fa456d
SHA512ce0fc5383e3f1ef740ad06598e8c6dccd99bc80f3a44d9bba0b0f5dac9aae4ebf84c269eb26bb0538da1535e8614cdfe8e515d8f4b5ca793fc3bc5689dd7ed9d
-
Filesize
974KB
MD53baeaa766ea7f31a9147208efd957c75
SHA1c701de3d0e55425394ccbf8e0967639e86f3c54e
SHA25675e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d
SHA5129f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f
-
Filesize
131B
MD5d395a4eeaa7c84f2f05c8ace364000ea
SHA1003b94290141e02837573b39b39426dd7ff7f8d2
SHA25638a7a9d87a1da2554ca4debfc0d2b77737e300b8d6c8710047e5958d4c0036ce
SHA5120a5665b49f2861ba9575359d66b252b9611a2f51511e6b605b0cacd42d6850c4c3e64bac79d1a1e83358b9aede5a332596b94f3acd3d2131216e28ecdd9cb858