Analysis

  • max time kernel
    3796365s
  • max time network
    163s
  • platform
    android_x64
  • resource
    android-x64-arm64-20220823-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system
  • submitted
    24-01-2023 05:34

General

  • Target

    99e0053475ecd6a22b0e22b2441f0bf0a407b36be54e7d8220bb284c0bd494a8.apk

  • Size

    3.4MB

  • MD5

    2d21b43e6027134281324f460fc7fc66

  • SHA1

    3d6bf52403c493e92140a52149898bc64f76e359

  • SHA256

    99e0053475ecd6a22b0e22b2441f0bf0a407b36be54e7d8220bb284c0bd494a8

  • SHA512

    029eb7cff7ccf74b93f4667c786ba50320deee4f5c49bbe3ec1ca0bc8a8d0c34038a52931ffce6fa309f6e71fb1771a69f27ba373fc35308abbbaf2254607f97

  • SSDEEP

    49152:5uLlr42cZpvL7zVfiHqF3UzV1cx4ZfWmpPSPWR1m/s6/wLZfuY79S77qF6qW5bMN:5+UvL7zVfticx4ZfHmiEEZfpSKFGVrc

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra payload 1 IoCs
  • Makes use of the framework's Accessibility service. 2 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests enabling of the accessibility settings. 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Reads information about phone network operator.

Processes

  • com.glove.nurse
    1⤵
    • Makes use of the framework's Accessibility service.
    • Loads dropped Dex/Jar
    • Requests enabling of the accessibility settings.
    PID:4392

Network

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.glove.nurse/app_DynamicOptDex/WSyuNy.json
    Filesize

    1.9MB

    MD5

    2f61c20d6202f0c3f9e07301c0c49c81

    SHA1

    a64d114637d1cdd09941d2ea3d9d7d4c06c5fd55

    SHA256

    2af4ac652af0e7e35f6ed09ba5b6137299b7769a93f426e133773f80f335a576

    SHA512

    4cc63a70e45a3e468480ecde2244265ee8162c9a972dc145b23c4d3d3ecd4aa621afa9e851f7f01692d59ea5bed69115346c52fef1a3cd0bdefdf98f02c73001

  • /data/user/0/com.glove.nurse/app_DynamicOptDex/WSyuNy.json
    Filesize

    5.0MB

    MD5

    aac2dcd77392344f8dd31f4f01a57ce9

    SHA1

    5c7f8906901da794dc630d37cd9f501d44be6adb

    SHA256

    50ccc8e8c22a41b020f0f991395551f3f0fb683eae4aa88fa9333b4b3fa60a86

    SHA512

    1a9733330cb198be78d147d590a59735d1bcb3f9f56f2134e977b123d15ff81a254a684521cca3f2ec1fa498d64e8a79e5c1f55dd2f4ae62d8074edd8d8472e9

  • /data/user/0/com.glove.nurse/app_DynamicOptDex/oat/WSyuNy.json.cur.prof
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.glove.nurse/shared_prefs/pref_name_setting.xml
    Filesize

    131B

    MD5

    c8ab7cbbf6a6d1443f208caf2b48e5a4

    SHA1

    6c116b81d2b3a09b7bc72563320ac886401c1f31

    SHA256

    4a7c7fd1ee85d068c9e8941a0b524948830621ff5e8f5b5a12a442334b237bd5

    SHA512

    f2f27d6263a43ca9171c4114454614af44bdfdfbca328b8b8b81f129181285dab786c43a8d6950ccd39c59e628bdd7d8c8fec4e4ed81b923e6577c6bf3ccbc0c

  • /data/user/0/com.glove.nurse/shared_prefs/pref_name_setting.xml
    Filesize

    192B

    MD5

    27d4aacfafed2035fefe2a559979139f

    SHA1

    4794a76adf2082d4a98f8658c170601cf18259fa

    SHA256

    4303f34547a902993994d4398314b9254a723311a4e366a92e04a4e58c8f0baa

    SHA512

    5f369d0788292ed1831b5a1dce0f3ec474073d484df596502896ec4a9272291e5a8c2b331bf85ba48fce54b0c41efcae27b1750b5cb259f873a1b5e857c67ddb