Analysis
-
max time kernel
3796354s -
max time network
157s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
24-01-2023 05:34
Static task
static1
Behavioral task
behavioral1
Sample
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448.apk
-
Size
3.2MB
-
MD5
b5efac544d0252fa6e455623973d7785
-
SHA1
a3be74cf193eabf31eb342a4c47349ff5d2ed98b
-
SHA256
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448
-
SHA512
d9da522ba1179750ed5168ba652f37d88a542b3241802e8817a8f9aee60e67c1d408dacace1e9c2eddeb4a0de9872b2ea20c4947817e884d1fd6dd14c50edd14
-
SSDEEP
49152:dLkoqMI6jH8bN35czKUjMMC59xtoXJX5kdW2AL+pHqRzgmhRh5wSWh/DrYItwTG1:dL7qKjH8U+UjMd5y+7A0HN1h3nw+vTMs
Malware Config
Extracted
hydra
http://185.161.209.172
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral2/memory/4728-0.dex family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ozone.comic/app_DynamicOptDex/Ork.json 4728 com.ozone.comic -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 58 ip-api.com -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5c2c258ccd8ffa821682f4cba75bf5283
SHA130d62b0686a00be9bf3d9a5fd3bf6d491dd4f939
SHA2567c8adbf697ee086a3fb0b325ad0e21785c5ae66b8c46982c8108eca34c781174
SHA512eec4d7217c820fc19846359f22a09f605496ef1ba659e28410c2a1c4ff2d756bb31bf3f93b694266bcde01a897f6b0c475c0b1a7b1b0faa73b5c4e5ec4e00dbc
-
Filesize
3.6MB
MD55cfaa50e2b02ccb054c6e305a75e5e4e
SHA1285b0c1ef4892e7f74b3aa67bf89fe3a0175d755
SHA25694048f36f9818741f0cd3ecf1c5d7e4df56d1e732411de9bd33a0f125fe16455
SHA512e36b6338935ca65d6a65f4ddb7338dc05254541bd628659e33004de4617298d9da562f4032bbcb70dabd88359088d481d8e58e3540ef53da570362682c0859b1
-
Filesize
131B
MD56129ee14c641607cb69a7a2341c87c55
SHA180493f6b9c8035b638dfdd11c912e8fe5a2da91d
SHA2564a0d860d8b62ae51757bbe49685ea7ba4bf043db91d7afedecb31f72221d455a
SHA5127cfb9325dd54bda3cec96991ab1e5d449b99a0af186dc2436e07f55ecfb15c680252c3566c87050b9ee4871773597868f1e4606c8045b20a16302170cd371461