Analysis
-
max time kernel
2846741s -
max time network
139s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
13-01-2023 05:47
Static task
static1
Behavioral task
behavioral1
Sample
Google_Play_Store.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
Google_Play_Store.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
Google_Play_Store.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
Google_Play_Store.apk
-
Size
3.1MB
-
MD5
06cf10298c93ba089b7d6ff8dc83fdb1
-
SHA1
75bfb5c86bed1e4fa431620163b1707e0645b083
-
SHA256
75b693bb2da7c3c94ceb07b88ff9bee0dccaad15425e56344e415addbcf3737c
-
SHA512
2d4508e8d563351ac1699f776b2e632cbfc5f6e967fa1a1a05b9d4098eb3a3b7e7d83400032bb44f0cc1144da1e0e1c1881e249bea9eda0ffece0d3edc7c1bb9
-
SSDEEP
98304:UvLCmQAVcZff+/baymELAkyzjh4GwnO3WDWMgk:UumQ2cZfG/baymiAkyzj7wnOG5gk
Malware Config
Extracted
hydra
http://aykomediki.net
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral2/memory/4765-0.dex family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.wagon.track/app_DynamicOptDex/OdyqAaN.json 4765 com.wagon.track -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 48 ip-api.com 52 ip-api.com -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5281bbe18016d45aa9798a7fd3d4700f6
SHA10b342c1a181b9acaa009b0ef8220396d4cef89f3
SHA2561ad48872e0643b81541465070ee063aa115bf6fed538e252f745ae34f574b41b
SHA512600e0a742b475b1ec93095e126befb920a490f90bce605114aea7c11d91a0c4b6a18dfe4a9fe83a5fb8da800bbfec0ca33732e9ce4a4dc5bb9718e57271049ba
-
Filesize
4.4MB
MD55e778fa1b19c3d2f83f4547f9eb1fe3c
SHA1bbeef5360c21685137d05c1a3eadbdf6626eb75a
SHA256cda6b26aa4a8bf4d97933d4cb7d1caf1b537ac2539ed399925927b467fcb29e5
SHA512d5c703400e1d182f7c5a8f575a27b30ed0afdc8029d148700101dc890ea97b683471280f68e9b46462b48b28653486de8bd615cecf7cd67d81df2c8e605fca9f
-
Filesize
131B
MD5db618c11f1a7fab74fb12bfc2f1c2f40
SHA1b39d1999205691af76dd621ef7ca9ccea3e53e3a
SHA256bdda97889850d70ee74f975dac15c05364a3c9c9c5b19fa01bdf655c124e1369
SHA51280c9715c6068b1814c49d2289ef7be095724d75fc6c93950cbbfe8ac564688d33d61f4b3836653968c9943f77facf8c7c28281a7628e6e6b083a0621a1310a00