Analysis
-
max time kernel
1423655s -
max time network
165s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
19-09-2022 08:21
Static task
static1
Behavioral task
behavioral1
Sample
CoinbaseUpdate20.14.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
CoinbaseUpdate20.14.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
CoinbaseUpdate20.14.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
CoinbaseUpdate20.14.apk
-
Size
2.8MB
-
MD5
4a221804f5dec022c97fb357a9cfaef3
-
SHA1
d7ed8ef2bcfdd0a4d9dd80a55180cf24240a3121
-
SHA256
eb2f45849072ef2f4d638ce47b4f5a7b277c4569896f756a1bdc69d519530f79
-
SHA512
8669b638ace30100ab920940d2773248f2d557be993bfc75be21e473835f1027924c103ab36847d2d66337008534f18c539cdb3a32ab36324852300b3120480e
-
SSDEEP
49152:gczMN3P6UMvE2d8J+qE2WsSYuy3raEasn5KXyG7TLoGDtcX7LprG9:3Y6U8E2dgXE2mYuy3Hasn8XyGHLooars
Malware Config
Extracted
hydra
http://lalabanda.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral2/memory/4769-0.dex family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.thank.sand/app_DynamicOptDex/WH.json 4769 com.thank.sand -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 57 ip-api.com 64 ip-api.com -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD599fc964a71a9da067d47320ff8e1ee7d
SHA16cff0e9f9a5932b68283da1bf74c3ebb5398d11a
SHA25657794962be63ee1eb5a2cc575262209a493e85f6509471d97b0f2d6cea506119
SHA512327f216912d7aeae22d4b2e18e6c19d5588583fd92dccebb78d1192129fb73c5e054379786147d20bda9721965969c0f22956f14c51773eebb10a7ca678763ca
-
Filesize
3.6MB
MD5caca763a3aa5e71c4b321ec738b9b799
SHA1192320735a2ff2588d3d645f7de2868220d15578
SHA25658b7268cd1faaadd4cbca9df2435c9fa58a3310de6e83295517cf328bcf0584e
SHA51258ed911ea59102b2264bb12486ce89269a663dc0771b9e06df41d4b90f1295e3a57b8bf0b966194efd466211abd920ee286522ba594565d6cc03df54f2d3cc3d
-
Filesize
131B
MD5af71707dc36c3c1a81278d1815266845
SHA18c12c861199e968fdf1925b4b4e165798508c85e
SHA25687802f80031526b65a7bc19c781ad6167aaf37d030e46937140d3c1b89291f80
SHA51280c02d49132f5a81208fa0210fe08babd3c4753990878405d2337e800c12c883b9244deb28a5349929b8115218c61eff5c7e1bb6937abaa857b2e5c9dc707b98