Analysis
-
max time kernel
1102713s -
max time network
159s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
15-09-2022 15:13
Static task
static1
Behavioral task
behavioral1
Sample
18c5bf8ee185102b2cffb7e19ea9480113e94544f78c4d3eef628f635c2b77b4.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
18c5bf8ee185102b2cffb7e19ea9480113e94544f78c4d3eef628f635c2b77b4.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
18c5bf8ee185102b2cffb7e19ea9480113e94544f78c4d3eef628f635c2b77b4.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
18c5bf8ee185102b2cffb7e19ea9480113e94544f78c4d3eef628f635c2b77b4.apk
-
Size
1.0MB
-
MD5
7b5ca7af7560e1e00a53e3b2da398e8d
-
SHA1
d553b5b5fdb8e5b9c8bf291039820b4ff30ace87
-
SHA256
18c5bf8ee185102b2cffb7e19ea9480113e94544f78c4d3eef628f635c2b77b4
-
SHA512
1c416cc854000256adb6d2e34b401ff53d919aa503e40b9153186669521840efb67f9affe698911c6acb487ed918dc01e4aebbf32eb3e81b1bb5dd4e29237295
-
SSDEEP
24576:a/xMjXBYdbtCk1w72Ctm/8Hf95fVkbLXZVs5A0w45:aZbnK72CcMfb9ULiA0w45
Malware Config
Extracted
hydra
http://laurenwarren1566.top
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral2/memory/4909-0.dex family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.pretty.flock/app_DynamicOptDex/NFxRTXU.json 4909 com.pretty.flock -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 ip-api.com 44 ip-api.com -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5013c636eab0b61fe2cc47ff1ef8c166b
SHA143c1e802c1498cd7bb498bd158a07d93dc13ae81
SHA256d1413e17fcd2bc60e0273d1f95226e7d0d7c38d89aeffab041d5d7f9ed6f24d0
SHA512e81a2d0e5bc965c1585e8183432cdc3babbb4b369028cecb65f0a0025b5e5a8b5c265ab86f9bdc810121b03206dc26dfd4741111656a9992aa3e500c76dcdb6b
-
Filesize
540KB
MD5f8fbd39fae1f279d2ee95d4b9b429df8
SHA1e8295b4144b3eeb0b217f42754552fa52f73f9d6
SHA2568cd48eebcb786d457864536178e41c4a97079606d1871d3c464eb741315fa01e
SHA51293756886ce2ee37f762a8227bb21fc697441a969e1ea7eed5961d49a9e0bfaa90e9047572bc50ef2dabfd9d883595748c8ea529cdef38965e5d93aa3c085c935
-
Filesize
131B
MD5fcba2c4e01370038b4d48cbfece8b0b5
SHA1a13ccd00e5f553b31541960b426808e1d32c07ea
SHA25678e0714072dbcd3bfc265044975df2b63e7b4eccba8cc6d417d8a7df3cc0d91e
SHA51234a876882cf4c2417fba2087183f753a181009e66b36f0ef9fd368f0f7e4b63386f0c0da97b22e07e7262ee4951e5385131b01140c217376ddac46680640b453