Analysis

  • max time kernel
    912368s
  • max time network
    156s
  • platform
    android_x86
  • resource
    android-x86-arm-20220823-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system
  • submitted
    02-11-2022 04:23

General

  • Target

    981c18b7fe8f0e47a5e5f1e67b8a66a2.apk

  • Size

    2.4MB

  • MD5

    981c18b7fe8f0e47a5e5f1e67b8a66a2

  • SHA1

    3c26529c09a2cf168d22ac1cad88b55c1e515113

  • SHA256

    d105764cd5383acacd463517691a0a7578847a8174664fc2c1da5efd8a30719d

  • SHA512

    438e0bc868742d534f6504e4b4860afe63f0012c99dcf41cd6b2fdde88a3ed835f101d71c65bc3bd61696cb8b9dbea657042794c492dfbc6eee1ab3876ae6039

  • SSDEEP

    49152:yekGLrMrdYCdA/nVB83w4lnntA2ZGM2FtfiMbMlIAHhROmynu:yekGLrOdAPb83w4mM+DQiAhROmwu

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra payload 3 IoCs
  • Makes use of the framework's Accessibility service. 2 IoCs
  • Loads dropped Dex/Jar 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Reads information about phone network operator.

Processes

  • com.friend.bronze
    1⤵
    • Makes use of the framework's Accessibility service.
    • Loads dropped Dex/Jar
    PID:4079
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.friend.bronze/app_DynamicOptDex/maXclr.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.friend.bronze/app_DynamicOptDex/oat/x86/maXclr.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4161

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.friend.bronze/app_DynamicOptDex/maXclr.json
    Filesize

    573KB

    MD5

    9b50ff23ce1e9b44ed1e8b82b215ff55

    SHA1

    c320f62c2d16fb2ca2a66ac5fe037520c24ede61

    SHA256

    dd3df634332e866bb24bca154ca23cb3b3ed541b143c7f59741a88920b719376

    SHA512

    fe53e00b979baa01ffd32205fa49e781734ce216704c90f5b1d1d5c95d1515d0c04f53f539c3535a98c7ad190d3b8793703126df9264a4dffa5d6af8dfbb3795

  • /data/user/0/com.friend.bronze/app_DynamicOptDex/maXclr.json
    Filesize

    573KB

    MD5

    352027a3ddccb0268c8a258baf7b0785

    SHA1

    265846a424a839c4b1c091a6f46351514cecca55

    SHA256

    6cd4bb3f423ecb0e2f8c1608aff0d7285acdf57b21c44d49e2b766575b83f0ac

    SHA512

    58835f3e5f849c153b649f3271851a00311c248b8c3d999740467211c5368de7b9b97657f33964d99d7a3c9198b73a5a0280b725477c648913576388a68633e0

  • /data/user/0/com.friend.bronze/app_DynamicOptDex/maXclr.json
    Filesize

    573KB

    MD5

    a6a0b01293ec0b3dbbae09314fec130e

    SHA1

    ab177604001548c96c9520c522cae67219f78e85

    SHA256

    f02b4eea0c44ab172de2850cd225de809e85861dfa571b69581196cf83307c3c

    SHA512

    db689927a3a6c74415fabaf13e8e66463d405dca1b20020f67a3bed86b9d22da8a2698a57aad7b11c26dc8b9de9ab5fffa80895b9e95293d07bc7b304f0f6896

  • /data/user/0/com.friend.bronze/app_DynamicOptDex/maXclr.json
    Filesize

    573KB

    MD5

    352027a3ddccb0268c8a258baf7b0785

    SHA1

    265846a424a839c4b1c091a6f46351514cecca55

    SHA256

    6cd4bb3f423ecb0e2f8c1608aff0d7285acdf57b21c44d49e2b766575b83f0ac

    SHA512

    58835f3e5f849c153b649f3271851a00311c248b8c3d999740467211c5368de7b9b97657f33964d99d7a3c9198b73a5a0280b725477c648913576388a68633e0

  • /data/user/0/com.friend.bronze/app_DynamicOptDex/maXclr.json.x86.flock
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.friend.bronze/app_DynamicOptDex/oat/maXclr.json.cur.prof
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.friend.bronze/app_DynamicOptDex/oat/x86/maXclr.odex
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.friend.bronze/app_DynamicOptDex/oat/x86/maXclr.vdex
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.friend.bronze/shared_prefs/pref_name_setting.xml
    Filesize

    131B

    MD5

    b7caca7167459cef9e331bffccdfef31

    SHA1

    2c86d2e4cd211eb6a5d8e7f961e60502f90afc42

    SHA256

    5826e9368f513016d33f744f29b7407736648d713b4b28a2ae6764272761b32e

    SHA512

    09fe296974ac4072cd24bc696a42fe9967f0b9bd3f43f83948a535d0e47dbf24b975918d0f5733f6b936b0e06044b3359977287713fcead725cecc87a030265f