Analysis
-
max time kernel
3796352s -
max time network
161s -
platform
android_x64 -
resource
android-x64-arm64-20220823-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system -
submitted
24-01-2023 05:34
Static task
static1
Behavioral task
behavioral1
Sample
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448.apk
-
Size
3.2MB
-
MD5
b5efac544d0252fa6e455623973d7785
-
SHA1
a3be74cf193eabf31eb342a4c47349ff5d2ed98b
-
SHA256
152c236f84d44d34c3d0c6a6450ed933893fb6ea274e5561157f8a92966c0448
-
SHA512
d9da522ba1179750ed5168ba652f37d88a542b3241802e8817a8f9aee60e67c1d408dacace1e9c2eddeb4a0de9872b2ea20c4947817e884d1fd6dd14c50edd14
-
SSDEEP
49152:dLkoqMI6jH8bN35czKUjMMC59xtoXJX5kdW2AL+pHqRzgmhRh5wSWh/DrYItwTG1:dL7qKjH8U+UjMd5y+7A0HN1h3nw+vTMs
Malware Config
Extracted
hydra
http://185.161.209.172
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral3/memory/4593-0.dex family_hydra -
Makes use of the framework's Accessibility service. 2 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ozone.comic Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ozone.comic -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ozone.comic/app_DynamicOptDex/Ork.json 4593 com.ozone.comic -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.ozone.comic -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 58 ip-api.com -
Reads information about phone network operator.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5c2c258ccd8ffa821682f4cba75bf5283
SHA130d62b0686a00be9bf3d9a5fd3bf6d491dd4f939
SHA2567c8adbf697ee086a3fb0b325ad0e21785c5ae66b8c46982c8108eca34c781174
SHA512eec4d7217c820fc19846359f22a09f605496ef1ba659e28410c2a1c4ff2d756bb31bf3f93b694266bcde01a897f6b0c475c0b1a7b1b0faa73b5c4e5ec4e00dbc
-
Filesize
3.6MB
MD55cfaa50e2b02ccb054c6e305a75e5e4e
SHA1285b0c1ef4892e7f74b3aa67bf89fe3a0175d755
SHA25694048f36f9818741f0cd3ecf1c5d7e4df56d1e732411de9bd33a0f125fe16455
SHA512e36b6338935ca65d6a65f4ddb7338dc05254541bd628659e33004de4617298d9da562f4032bbcb70dabd88359088d481d8e58e3540ef53da570362682c0859b1
-
Filesize
131B
MD5596b085baa6bbe6f186d24e05879f8f3
SHA1bb08f241f14c9a57d20f00022d196bab42f9bed3
SHA2563c276a9115c6245737494294aa635ebbbc1c6921eec87e21aed41e0d4ea20572
SHA5125fcbfd9d7f8bfc894e1e2439e35441cdf2e9bbcc28672a553e28df3ffb1e36998d04f323d31639f797218aaa77d07399a4b7c6d1cdcfdc0ebb11d05b73539152