Resubmissions

14-11-2022 10:39

221114-mqcfssbh8s 10

03-11-2022 12:00

221103-n6p79scbfr 10

General

  • Target

    test.apk

  • Size

    2.2MB

  • Sample

    221103-n6p79scbfr

  • MD5

    6544dc1ad079fda5132967a23d1afde8

  • SHA1

    2f1caac13dfb0e0001a301302e95ac4e0a28f2fe

  • SHA256

    dd81805033901b13456bc9ab96c0aaa0c4f131b13e4b7f5a5aa344554a0c198f

  • SHA512

    1e4fc15ed8b4cbc3e360c7b6a52728afaccf20e0e28f7463fdde5027744d377d70bf65f315efc6128711201cdf0d7e7218c2eae9e9f70fbf353cfc6921e34dec

  • SSDEEP

    49152:AeqwjEh2s6z63DhUE8LyitImj2DeNdo84ef:AxWEhi8+DDCDeNdqef

Malware Config

Extracted

Family

hydra

C2

http://playstoresgooglese.net

http://ciopuntinoapoldoapol.com

http://ciopuntinoapoldoaeuoererapol.com

http://juopwertsntinoapoldoapol.com

http://juooqpaotumoturuaisuasol.com

http://famlopusuntoaieiajsiafsdl.com

Targets

    • Target

      test.apk

    • Size

      2.2MB

    • MD5

      6544dc1ad079fda5132967a23d1afde8

    • SHA1

      2f1caac13dfb0e0001a301302e95ac4e0a28f2fe

    • SHA256

      dd81805033901b13456bc9ab96c0aaa0c4f131b13e4b7f5a5aa344554a0c198f

    • SHA512

      1e4fc15ed8b4cbc3e360c7b6a52728afaccf20e0e28f7463fdde5027744d377d70bf65f315efc6128711201cdf0d7e7218c2eae9e9f70fbf353cfc6921e34dec

    • SSDEEP

      49152:AeqwjEh2s6z63DhUE8LyitImj2DeNdo84ef:AxWEhi8+DDCDeNdqef

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks