Analysis
-
max time kernel
2832513s -
max time network
168s -
platform
android_x64 -
resource
android-x64-arm64-20220823-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system -
submitted
13-01-2023 01:50
Static task
static1
Behavioral task
behavioral1
Sample
Google_Play_Store.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
Google_Play_Store.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
Google_Play_Store.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
Google_Play_Store.apk
-
Size
3.1MB
-
MD5
06cf10298c93ba089b7d6ff8dc83fdb1
-
SHA1
75bfb5c86bed1e4fa431620163b1707e0645b083
-
SHA256
75b693bb2da7c3c94ceb07b88ff9bee0dccaad15425e56344e415addbcf3737c
-
SHA512
2d4508e8d563351ac1699f776b2e632cbfc5f6e967fa1a1a05b9d4098eb3a3b7e7d83400032bb44f0cc1144da1e0e1c1881e249bea9eda0ffece0d3edc7c1bb9
-
SSDEEP
98304:UvLCmQAVcZff+/baymELAkyzjh4GwnO3WDWMgk:UumQ2cZfG/baymiAkyzj7wnOG5gk
Malware Config
Extracted
hydra
http://aykomediki.net
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.wagon.track/app_DynamicOptDex/OdyqAaN.json family_hydra -
Makes use of the framework's Accessibility service. 2 IoCs
Processes:
com.wagon.trackdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.wagon.track Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.wagon.track -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.wagon.trackioc pid process /data/user/0/com.wagon.track/app_DynamicOptDex/OdyqAaN.json 4405 com.wagon.track -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.wagon.trackdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.wagon.track -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 50 ip-api.com -
Reads information about phone network operator.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5281bbe18016d45aa9798a7fd3d4700f6
SHA10b342c1a181b9acaa009b0ef8220396d4cef89f3
SHA2561ad48872e0643b81541465070ee063aa115bf6fed538e252f745ae34f574b41b
SHA512600e0a742b475b1ec93095e126befb920a490f90bce605114aea7c11d91a0c4b6a18dfe4a9fe83a5fb8da800bbfec0ca33732e9ce4a4dc5bb9718e57271049ba
-
Filesize
4.4MB
MD55e778fa1b19c3d2f83f4547f9eb1fe3c
SHA1bbeef5360c21685137d05c1a3eadbdf6626eb75a
SHA256cda6b26aa4a8bf4d97933d4cb7d1caf1b537ac2539ed399925927b467fcb29e5
SHA512d5c703400e1d182f7c5a8f575a27b30ed0afdc8029d148700101dc890ea97b683471280f68e9b46462b48b28653486de8bd615cecf7cd67d81df2c8e605fca9f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
131B
MD5bf45713027319b24a1673dab8e635684
SHA136fbc4b4a2d33f89b5ca9d821f4dc0e849c22a02
SHA256b2bc5c2276ef3235849840527c9801d97b7ee61b07f8ff4642ed9b2ec9cadf72
SHA51281ae4ac02bf262efb1fd35899f2a5a1a3d80d876e59c6ef26b4adb8888ec666300189777267f37a16f11e6c8c54b3996565537e365ac2f9450272906a96b80fa