Analysis
-
max time kernel
1102713s -
max time network
159s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
15-09-2022 15:13
Static task
static1
Behavioral task
behavioral1
Sample
18c5bf8ee185102b2cffb7e19ea9480113e94544f78c4d3eef628f635c2b77b4.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
18c5bf8ee185102b2cffb7e19ea9480113e94544f78c4d3eef628f635c2b77b4.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
18c5bf8ee185102b2cffb7e19ea9480113e94544f78c4d3eef628f635c2b77b4.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
18c5bf8ee185102b2cffb7e19ea9480113e94544f78c4d3eef628f635c2b77b4.apk
-
Size
1.0MB
-
MD5
7b5ca7af7560e1e00a53e3b2da398e8d
-
SHA1
d553b5b5fdb8e5b9c8bf291039820b4ff30ace87
-
SHA256
18c5bf8ee185102b2cffb7e19ea9480113e94544f78c4d3eef628f635c2b77b4
-
SHA512
1c416cc854000256adb6d2e34b401ff53d919aa503e40b9153186669521840efb67f9affe698911c6acb487ed918dc01e4aebbf32eb3e81b1bb5dd4e29237295
-
SSDEEP
24576:a/xMjXBYdbtCk1w72Ctm/8Hf95fVkbLXZVs5A0w45:aZbnK72CcMfb9ULiA0w45
Malware Config
Extracted
hydra
http://laurenwarren1566.top
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.pretty.flock/app_DynamicOptDex/NFxRTXU.json family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.pretty.flockioc pid process /data/user/0/com.pretty.flock/app_DynamicOptDex/NFxRTXU.json 4909 com.pretty.flock -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 33 ip-api.com 44 ip-api.com -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.pretty.flock/app_DynamicOptDex/NFxRTXU.jsonFilesize
231KB
MD5013c636eab0b61fe2cc47ff1ef8c166b
SHA143c1e802c1498cd7bb498bd158a07d93dc13ae81
SHA256d1413e17fcd2bc60e0273d1f95226e7d0d7c38d89aeffab041d5d7f9ed6f24d0
SHA512e81a2d0e5bc965c1585e8183432cdc3babbb4b369028cecb65f0a0025b5e5a8b5c265ab86f9bdc810121b03206dc26dfd4741111656a9992aa3e500c76dcdb6b
-
/data/user/0/com.pretty.flock/app_DynamicOptDex/NFxRTXU.jsonFilesize
540KB
MD5f8fbd39fae1f279d2ee95d4b9b429df8
SHA1e8295b4144b3eeb0b217f42754552fa52f73f9d6
SHA2568cd48eebcb786d457864536178e41c4a97079606d1871d3c464eb741315fa01e
SHA51293756886ce2ee37f762a8227bb21fc697441a969e1ea7eed5961d49a9e0bfaa90e9047572bc50ef2dabfd9d883595748c8ea529cdef38965e5d93aa3c085c935
-
/data/user/0/com.pretty.flock/app_DynamicOptDex/oat/NFxRTXU.json.cur.profMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/com.pretty.flock/shared_prefs/pref_name_setting.xmlFilesize
131B
MD5fcba2c4e01370038b4d48cbfece8b0b5
SHA1a13ccd00e5f553b31541960b426808e1d32c07ea
SHA25678e0714072dbcd3bfc265044975df2b63e7b4eccba8cc6d417d8a7df3cc0d91e
SHA51234a876882cf4c2417fba2087183f753a181009e66b36f0ef9fd368f0f7e4b63386f0c0da97b22e07e7262ee4951e5385131b01140c217376ddac46680640b453