General
-
Target
9117a83c2d736ce8b3e8493116b62e4a05ab9c7a736f83e59f3166f6fccb83f4.zip
-
Size
1.9MB
-
Sample
230113-yandxaga8s
-
MD5
04ceb082253fa3b2a0c94318408990d9
-
SHA1
a0d7cf385bab3c3ce7339ef2f89064804b588e23
-
SHA256
e2a997ea223ab55f1589588f9d9a4ec4b1998b7c0de983b69be09fca53b1db6e
-
SHA512
76e85f2b7540773e887c5434f1d75cf8f4f1879ce06caa55769f8485a53f1daf1dcd52df829c971fd0298119b9f4a4eb652b1724d3badbe5b96579967f518e73
-
SSDEEP
49152:4OCIAhj+MYlgmYLgrnVyuF5bTl1EIWw4Y9v2kRg:4OG5YlghgjB/4Q4YgkRg
Static task
static1
Behavioral task
behavioral1
Sample
4d15496267219d11a061ab5c201b4895277afa4d9b75943e61163a184cd50169.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
4d15496267219d11a061ab5c201b4895277afa4d9b75943e61163a184cd50169.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
4d15496267219d11a061ab5c201b4895277afa4d9b75943e61163a184cd50169.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
hydra
http://tillywinters22.top
Targets
-
-
Target
4d15496267219d11a061ab5c201b4895277afa4d9b75943e61163a184cd50169
-
Size
2.1MB
-
MD5
36183b9fbc6480025c1040b7109b2da4
-
SHA1
3d1d04d28ba4b9f5780f7585f6f7474f419533d5
-
SHA256
4d15496267219d11a061ab5c201b4895277afa4d9b75943e61163a184cd50169
-
SHA512
a6c4cf9be4de865b67edac3cee49955d562709ec0e12693eaf6918a647fd166d4ac7113ac1b42e1870e7cb26da9517ef55f2a8f16858661ae799bf906d79104e
-
SSDEEP
49152:bF+O4Z1FxayrRfkVWaH5pYgcTnZ3tRQq4+gKPb22qzvdb:Z0RRwvYgwVYqkKPbBOdb
Score10/10-
Hydra payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-