General
-
Target
481598d7c10e3dfd538e8c21141ab337c2074047227a58f8f639eb374e971cf4.zip
-
Size
1.9MB
-
Sample
230120-ry5vjabb66
-
MD5
64b8560d1f0a986b0a824b487e88bd93
-
SHA1
d7cad07e69d7163fca6a51082a948cdeec90be23
-
SHA256
5df20525d7148aa46400d10794cb512cfd116bda28bb9b0ba96d07a4b4bb179d
-
SHA512
c65fb6c14be2b7a0fafe9606c9af07cf83961c2435ed9df42bfb4b91dd36a722ca29e0a602cc63e7c3719507fb316d0bcce3f5ec0d7d6fa16597749ce545ae07
-
SSDEEP
49152:JjLZDYFvmF6nPveNIpp7cU5mi+WGkJusfm0hHwxNBe:JjlYFeoHp5cU5miGkfm0OI
Static task
static1
Behavioral task
behavioral1
Sample
481598d7c10e3dfd538e8c21141ab337c2074047227a58f8f639eb374e971cf4.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
481598d7c10e3dfd538e8c21141ab337c2074047227a58f8f639eb374e971cf4.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
481598d7c10e3dfd538e8c21141ab337c2074047227a58f8f639eb374e971cf4.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
hydra
http://lanagarza441.lol
Targets
-
-
Target
481598d7c10e3dfd538e8c21141ab337c2074047227a58f8f639eb374e971cf4
-
Size
2.0MB
-
MD5
9c493810258eeca47b5001fd0c968111
-
SHA1
9461d1a5f6ae935a1ba6bc2d05e76e55ac79f639
-
SHA256
481598d7c10e3dfd538e8c21141ab337c2074047227a58f8f639eb374e971cf4
-
SHA512
7cd767cacd064def4443f21b346b4a78b8573dc760714210eda5f4284a4a236b795e73cc0e2c50f7837693741416007bcf913034dc28dd21a5084099ca68a172
-
SSDEEP
49152:j/j9ArJ/vPFDdpfE/81ZRPRNdoIIVVYG2FrGJ:j/jOxvFz1rRNdobVVYREJ
Score10/10-
Hydra payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-