Analysis
-
max time kernel
2593685s -
max time network
149s -
platform
android_x64 -
resource
android-x64-arm64-20220823-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system -
submitted
10-01-2023 07:30
Static task
static1
Behavioral task
behavioral1
Sample
Google_Play_Store.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
Google_Play_Store.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
Google_Play_Store.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
Google_Play_Store.apk
-
Size
3.1MB
-
MD5
06cf10298c93ba089b7d6ff8dc83fdb1
-
SHA1
75bfb5c86bed1e4fa431620163b1707e0645b083
-
SHA256
75b693bb2da7c3c94ceb07b88ff9bee0dccaad15425e56344e415addbcf3737c
-
SHA512
2d4508e8d563351ac1699f776b2e632cbfc5f6e967fa1a1a05b9d4098eb3a3b7e7d83400032bb44f0cc1144da1e0e1c1881e249bea9eda0ffece0d3edc7c1bb9
-
SSDEEP
98304:UvLCmQAVcZff+/baymELAkyzjh4GwnO3WDWMgk:UumQ2cZfG/baymiAkyzj7wnOG5gk
Malware Config
Extracted
hydra
http://aykomediki.net
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral3/memory/4450-0.dex family_hydra -
Makes use of the framework's Accessibility service. 2 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.wagon.track Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.wagon.track -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.wagon.track/app_DynamicOptDex/OdyqAaN.json 4450 com.wagon.track -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.wagon.track -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 65 ip-api.com -
Reads information about phone network operator.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5281bbe18016d45aa9798a7fd3d4700f6
SHA10b342c1a181b9acaa009b0ef8220396d4cef89f3
SHA2561ad48872e0643b81541465070ee063aa115bf6fed538e252f745ae34f574b41b
SHA512600e0a742b475b1ec93095e126befb920a490f90bce605114aea7c11d91a0c4b6a18dfe4a9fe83a5fb8da800bbfec0ca33732e9ce4a4dc5bb9718e57271049ba
-
Filesize
4.4MB
MD55e778fa1b19c3d2f83f4547f9eb1fe3c
SHA1bbeef5360c21685137d05c1a3eadbdf6626eb75a
SHA256cda6b26aa4a8bf4d97933d4cb7d1caf1b537ac2539ed399925927b467fcb29e5
SHA512d5c703400e1d182f7c5a8f575a27b30ed0afdc8029d148700101dc890ea97b683471280f68e9b46462b48b28653486de8bd615cecf7cd67d81df2c8e605fca9f
-
Filesize
131B
MD50506cd48ac89fd230f650bffd8bd7024
SHA187e290a8b00ff8bf9b8214e407e6525a5401eba2
SHA25677d4b12b9d4f8e731ea79128ae46249831d357bca1eb5dda76ced187fe03328b
SHA5122b397bac5165bd24f274d43f123e30cc879c9cc4fb291810d35e4a23c328108a8c5b5a435472ae56b1685ef334f6c7e0f0a2cec50d6a97e2b36770e962e216b2