Analysis
-
max time kernel
2840820s -
max time network
163s -
platform
android_x64 -
resource
android-x64-arm64-20220823-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system -
submitted
13-01-2023 04:08
Static task
static1
Behavioral task
behavioral1
Sample
Google_Play_Store.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
Google_Play_Store.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
Google_Play_Store.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
Google_Play_Store.apk
-
Size
3.1MB
-
MD5
06cf10298c93ba089b7d6ff8dc83fdb1
-
SHA1
75bfb5c86bed1e4fa431620163b1707e0645b083
-
SHA256
75b693bb2da7c3c94ceb07b88ff9bee0dccaad15425e56344e415addbcf3737c
-
SHA512
2d4508e8d563351ac1699f776b2e632cbfc5f6e967fa1a1a05b9d4098eb3a3b7e7d83400032bb44f0cc1144da1e0e1c1881e249bea9eda0ffece0d3edc7c1bb9
-
SSDEEP
98304:UvLCmQAVcZff+/baymELAkyzjh4GwnO3WDWMgk:UumQ2cZfG/baymiAkyzj7wnOG5gk
Malware Config
Extracted
hydra
http://aykomediki.net
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral3/memory/4604-0.dex family_hydra -
Makes use of the framework's Accessibility service. 2 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.wagon.track Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.wagon.track -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.wagon.track/app_DynamicOptDex/OdyqAaN.json 4604 com.wagon.track -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.wagon.track -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 71 ip-api.com -
Reads information about phone network operator.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5281bbe18016d45aa9798a7fd3d4700f6
SHA10b342c1a181b9acaa009b0ef8220396d4cef89f3
SHA2561ad48872e0643b81541465070ee063aa115bf6fed538e252f745ae34f574b41b
SHA512600e0a742b475b1ec93095e126befb920a490f90bce605114aea7c11d91a0c4b6a18dfe4a9fe83a5fb8da800bbfec0ca33732e9ce4a4dc5bb9718e57271049ba
-
Filesize
4.4MB
MD55e778fa1b19c3d2f83f4547f9eb1fe3c
SHA1bbeef5360c21685137d05c1a3eadbdf6626eb75a
SHA256cda6b26aa4a8bf4d97933d4cb7d1caf1b537ac2539ed399925927b467fcb29e5
SHA512d5c703400e1d182f7c5a8f575a27b30ed0afdc8029d148700101dc890ea97b683471280f68e9b46462b48b28653486de8bd615cecf7cd67d81df2c8e605fca9f
-
Filesize
131B
MD51ffc24d72cedcb1c8293b75e897870c8
SHA1e97a0b217d093ee4b23429389e80fe08365e8a9d
SHA256d50b157a218e63261203005bc3d63dba2fc069d8fb86ad25d0cc0f2a4a32d863
SHA512df53bdc2ef3d803f36d6f48e17fc9571e535e2c5dffb4dce418ecc9b844b6735014af8c58d1305b3423718b5da7b3009d9c0754cf00850cb9adaa0435e881c16