General
-
Target
play.apk
-
Size
3.3MB
-
Sample
230330-nm8khadh6w
-
MD5
495c6f125cdf7000744754939c317dd1
-
SHA1
67f4772359774348a4571f4f2f5889bdd20eb428
-
SHA256
17a4c3bf778a3c82506e420151c64978f5bea83bb49947bc2d907bf530ac34e9
-
SHA512
ecb246d14f46d6e45d89dfe4a9116befbede05d6b623442967e0a6e1f8a51124dbd70c4a0ae07f3f3fdf722a17f39e722690437738e5d635697021c7223c99ef
-
SSDEEP
98304:/xePnBfIvlnIKjeemBoBqbrPtR6gEElDVn8rMaLWEEADBLxS4H:J0BQyAsKKrPtR6pElpn8waLWEbO4H
Static task
static1
Behavioral task
behavioral1
Sample
play.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
play.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
play.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
hydra
http://fermankaygoscone.com
Targets
-
-
Target
play.apk
-
Size
3.3MB
-
MD5
495c6f125cdf7000744754939c317dd1
-
SHA1
67f4772359774348a4571f4f2f5889bdd20eb428
-
SHA256
17a4c3bf778a3c82506e420151c64978f5bea83bb49947bc2d907bf530ac34e9
-
SHA512
ecb246d14f46d6e45d89dfe4a9116befbede05d6b623442967e0a6e1f8a51124dbd70c4a0ae07f3f3fdf722a17f39e722690437738e5d635697021c7223c99ef
-
SSDEEP
98304:/xePnBfIvlnIKjeemBoBqbrPtR6gEElDVn8rMaLWEEADBLxS4H:J0BQyAsKKrPtR6pElpn8waLWEbO4H
Score10/10-
Hydra payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-