Analysis
-
max time kernel
3792753s -
max time network
158s -
platform
android_x86 -
resource
android-x86-arm-20220823-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system -
submitted
24-01-2023 05:34
Static task
static1
Behavioral task
behavioral1
Sample
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448.apk
-
Size
3.2MB
-
MD5
b5efac544d0252fa6e455623973d7785
-
SHA1
a3be74cf193eabf31eb342a4c47349ff5d2ed98b
-
SHA256
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448
-
SHA512
d9da522ba1179750ed5168ba652f37d88a542b3241802e8817a8f9aee60e67c1d408dacace1e9c2eddeb4a0de9872b2ea20c4947817e884d1fd6dd14c50edd14
-
SSDEEP
49152:dLkoqMI6jH8bN35czKUjMMC59xtoXJX5kdW2AL+pHqRzgmhRh5wSWh/DrYItwTG1:dL7qKjH8U+UjMd5y+7A0HN1h3nw+vTMs
Malware Config
Extracted
hydra
http://185.161.209.172
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 2 IoCs
resource yara_rule behavioral1/memory/4153-0.dex family_hydra behavioral1/memory/4059-0.dex family_hydra -
Makes use of the framework's Accessibility service. 2 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ozone.comic Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ozone.comic -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ozone.comic/app_DynamicOptDex/Ork.json 4153 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ozone.comic/app_DynamicOptDex/Ork.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ozone.comic/app_DynamicOptDex/oat/x86/Ork.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.ozone.comic/app_DynamicOptDex/Ork.json 4059 com.ozone.comic -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 ip-api.com -
Reads information about phone network operator.
Processes
-
com.ozone.comic1⤵
- Makes use of the framework's Accessibility service.
- Loads dropped Dex/Jar
PID:4059 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ozone.comic/app_DynamicOptDex/Ork.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ozone.comic/app_DynamicOptDex/oat/x86/Ork.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4153
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5c2c258ccd8ffa821682f4cba75bf5283
SHA130d62b0686a00be9bf3d9a5fd3bf6d491dd4f939
SHA2567c8adbf697ee086a3fb0b325ad0e21785c5ae66b8c46982c8108eca34c781174
SHA512eec4d7217c820fc19846359f22a09f605496ef1ba659e28410c2a1c4ff2d756bb31bf3f93b694266bcde01a897f6b0c475c0b1a7b1b0faa73b5c4e5ec4e00dbc
-
Filesize
3.6MB
MD55198fc9bc7fc53e4a004ca1f81892e33
SHA1e3745a2756ebfcdb960e492715f1dd9bacc93443
SHA2569038613ef2a3e00c68891f26a5b9c862b479613b7159b9f2808c159a8ed47e18
SHA5127809e096d224cd4a0c94fa8fe8f99a5197299f36caa46e2a89637d51857c23bc0664d6bc01ad639752ee5f7abea772dc94cf0461058b331a5fc387dc43fee60b
-
Filesize
3.6MB
MD55cfaa50e2b02ccb054c6e305a75e5e4e
SHA1285b0c1ef4892e7f74b3aa67bf89fe3a0175d755
SHA25694048f36f9818741f0cd3ecf1c5d7e4df56d1e732411de9bd33a0f125fe16455
SHA512e36b6338935ca65d6a65f4ddb7338dc05254541bd628659e33004de4617298d9da562f4032bbcb70dabd88359088d481d8e58e3540ef53da570362682c0859b1
-
Filesize
131B
MD559ce67c53707ea2ff7c2b7116c3b4456
SHA104e81689aa45b2cb0c23d7efd6b931aad5c967f1
SHA256ff5fc21e804dd1478e645fc4a6f8c1a3b94a652c0cfb7ec282a4c3173cc12f66
SHA512c3acbb503144141be5e80b0fc3b089ae60d4b7df4002a4ef3016542816f3036a99d08ff1bbdf521923ffc6e6d2c255963f657d66a2b43645342d3208a7782ac9