Analysis
-
max time kernel
844021s -
max time network
308s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
30-03-2023 11:31
Static task
static1
Behavioral task
behavioral1
Sample
play.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
play.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
play.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
play.apk
-
Size
3.3MB
-
MD5
495c6f125cdf7000744754939c317dd1
-
SHA1
67f4772359774348a4571f4f2f5889bdd20eb428
-
SHA256
17a4c3bf778a3c82506e420151c64978f5bea83bb49947bc2d907bf530ac34e9
-
SHA512
ecb246d14f46d6e45d89dfe4a9116befbede05d6b623442967e0a6e1f8a51124dbd70c4a0ae07f3f3fdf722a17f39e722690437738e5d635697021c7223c99ef
-
SSDEEP
98304:/xePnBfIvlnIKjeemBoBqbrPtR6gEElDVn8rMaLWEEADBLxS4H:J0BQyAsKKrPtR6pElpn8waLWEbO4H
Malware Config
Extracted
hydra
http://fermankaygoscone.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.dance.vintage/app_DynamicOptDex/rKk.json family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.dance.vintageioc pid process /data/user/0/com.dance.vintage/app_DynamicOptDex/rKk.json 4830 com.dance.vintage -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 59 ip-api.com -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.dance.vintage/app_DynamicOptDex/oat/rKk.json.cur.profMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/com.dance.vintage/app_DynamicOptDex/rKk.jsonFilesize
1.6MB
MD56939b1e327dfc7fb12a2525048e79629
SHA19cade1a973fb9d03e9e60725ce729cac6190a5cc
SHA2569268521108da189b2c4056512e79c2c5aca6164f23fac07843aab4480d3893b9
SHA5129e41163f8006a1adea403f06b0cbae0ff67e3d07397487285b57854b7d05f17b12945ec3a9c4af2e6694a7c8a326fe055d54ee13334dbd8b63dc228d04d96398
-
/data/user/0/com.dance.vintage/app_DynamicOptDex/rKk.jsonFilesize
4.4MB
MD593157c4f705712e8b6004b094c808424
SHA15a31ad317dd28216f71d0caeab8ac1f70c491905
SHA2564794d5481c97abba38e89a265dadbc9625ab004c53ea0c412b51e4b75f0e5dee
SHA51218c8fac3ceaaccaa821c0710a10e84da0b30d011e3ebb2eaa92fca586221a241cb23305d3032b334b104dde4c7fcd7db3c4c7fe2acb85926c158cba95d557907