Analysis
-
max time kernel
2309087s -
max time network
155s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
18-11-2022 07:22
Static task
static1
Behavioral task
behavioral1
Sample
Google_Play_Store.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
Google_Play_Store.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
Google_Play_Store.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
Google_Play_Store.apk
-
Size
3.1MB
-
MD5
06cf10298c93ba089b7d6ff8dc83fdb1
-
SHA1
75bfb5c86bed1e4fa431620163b1707e0645b083
-
SHA256
75b693bb2da7c3c94ceb07b88ff9bee0dccaad15425e56344e415addbcf3737c
-
SHA512
2d4508e8d563351ac1699f776b2e632cbfc5f6e967fa1a1a05b9d4098eb3a3b7e7d83400032bb44f0cc1144da1e0e1c1881e249bea9eda0ffece0d3edc7c1bb9
-
SSDEEP
98304:UvLCmQAVcZff+/baymELAkyzjh4GwnO3WDWMgk:UumQ2cZfG/baymiAkyzj7wnOG5gk
Malware Config
Extracted
hydra
http://aykomediki.net
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral2/memory/4777-0.dex family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.wagon.track/app_DynamicOptDex/OdyqAaN.json 4777 com.wagon.track -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 45 ip-api.com 48 ip-api.com -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5281bbe18016d45aa9798a7fd3d4700f6
SHA10b342c1a181b9acaa009b0ef8220396d4cef89f3
SHA2561ad48872e0643b81541465070ee063aa115bf6fed538e252f745ae34f574b41b
SHA512600e0a742b475b1ec93095e126befb920a490f90bce605114aea7c11d91a0c4b6a18dfe4a9fe83a5fb8da800bbfec0ca33732e9ce4a4dc5bb9718e57271049ba
-
Filesize
4.4MB
MD55e778fa1b19c3d2f83f4547f9eb1fe3c
SHA1bbeef5360c21685137d05c1a3eadbdf6626eb75a
SHA256cda6b26aa4a8bf4d97933d4cb7d1caf1b537ac2539ed399925927b467fcb29e5
SHA512d5c703400e1d182f7c5a8f575a27b30ed0afdc8029d148700101dc890ea97b683471280f68e9b46462b48b28653486de8bd615cecf7cd67d81df2c8e605fca9f
-
Filesize
974KB
MD53baeaa766ea7f31a9147208efd957c75
SHA1c701de3d0e55425394ccbf8e0967639e86f3c54e
SHA25675e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d
SHA5129f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f
-
Filesize
131B
MD5945b30db3bc2c5fb244c13e4c7d1fa79
SHA1ffa2c7eb79b41768195cc6c2a53b2e4996ae027a
SHA2564d275ed78717f6c056811496ceef9ca2293b383339b68c337e94c8890634d5da
SHA5121d1d5bb519f721a3113978f3375899cbe478904b597f47babb2180cf03839ef4e7ffa197bf7f96aa4e67989f4fb91fa6f271c02b0d56b69d5a7be60cceed5b1c