Analysis
-
max time kernel
103399s -
max time network
155s -
platform
android_x86 -
resource
android-x86-arm-20220823-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system -
submitted
31-01-2023 05:48
Static task
static1
Behavioral task
behavioral1
Sample
eBayMobile12.18.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
eBayMobile12.18.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
eBayMobile12.18.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
eBayMobile12.18.apk
-
Size
2.9MB
-
MD5
8e3c3a0e489ab0c9ab00a59c81c19b90
-
SHA1
ce53f47c5a8c0f025692eb936e33417468b2f82c
-
SHA256
4d0c0b814eae82d294710a5849cf137ca8c89ab0421be80b7c59bd4af3738d12
-
SHA512
b5f1226f487314af61e1bc2e322b435ceacea0b7f431a6ca93d5420c25f6ea390be676f80d148aad662b0742b2211f839e7d41ec07e355ab531253ccbefb7990
-
SSDEEP
49152:Ucz4N3NNy9zYz2nHZiGtXyPXLjMRfbpwlwbYZ1dWyIALZLtrTFfW8di8JD2w1:L6s9sza5iyC/sRfVwab0d0AzTFftEQr1
Malware Config
Extracted
hydra
http://lalabanda.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 2 IoCs
resource yara_rule behavioral1/memory/4180-0.dex family_hydra behavioral1/memory/4131-0.dex family_hydra -
Makes use of the framework's Accessibility service. 3 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tongue.tuna Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tongue.tuna Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tongue.tuna -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tongue.tuna/app_DynamicOptDex/IBbWXt.json 4180 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tongue.tuna/app_DynamicOptDex/IBbWXt.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tongue.tuna/app_DynamicOptDex/oat/x86/IBbWXt.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tongue.tuna/app_DynamicOptDex/IBbWXt.json 4131 com.tongue.tuna -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 53 ip-api.com -
Reads information about phone network operator.
Processes
-
com.tongue.tuna1⤵
- Makes use of the framework's Accessibility service.
- Loads dropped Dex/Jar
PID:4131 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tongue.tuna/app_DynamicOptDex/IBbWXt.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tongue.tuna/app_DynamicOptDex/oat/x86/IBbWXt.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4180
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5bafe12a9d941afbca305620879849c7a
SHA14009bb6458cf6eba44e60b58a5c3748de12e8515
SHA25613ec22a4ccdfd9f468d2bb7e3f2e6d886119caf1d7d0deb8c32a1f6e9dcb9806
SHA512771f5ef3cfd3fafbf582c76ca33b970ac95b3e4e765668428b581dbbe55fdfcd74cf8fb3fe7f90bdd352888c25429daf4f32a081e5bf2ac08e4a1ceee2f43087
-
Filesize
3.6MB
MD575c36afec3c816acf958b039db4065f4
SHA1e16d47dc4c597a5b13fed920f367789262ad0162
SHA2565e5698bbd30997a749fa6e342d8381e042be60c70686fab7f59b151909c39a99
SHA512eede6c3acb863e7172569fa0814aa65b3c1aac71a46adc4b14f0106de6f63a283b588704b1199ecd0a49321898f745ec9600070d681cff8c4af43b26f6997c5d
-
Filesize
3.6MB
MD57135f1564d788d4f037d1fce183fb480
SHA1d0b34f23799c14770a8b5fc1f1a1d81697bb6f53
SHA256df7bbead42e925c5b6b349c89c5fa85b8dbd113317acf05fed32243b4827f6b3
SHA512d4ad950737096138a221850f58180962b5a29e81b4b6866f041f2ca7d3b0d03a2262ce7e081eb71c72d28c057e760521bb986136729be506b934f44ec04ebea2
-
Filesize
131B
MD585a60d6bc07cef5b6fed3d57c15755a3
SHA131c700007b3b05c7957e935bffda02e9a3672b5f
SHA256d12e8efab22e2ef4cbd2042849fdc778dd7f4d7081eb116594e1cbe68330e9ea
SHA51268e4e57136a54318eb6adc16e84eb0ccce28f87d6b8340440ffe53c2de76a86bf318e808d287df0c1455aa85e199b715d2bc98292e17179bca5f9d8a2e360d9e