Analysis
-
max time kernel
844021s -
max time network
308s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
30-03-2023 11:31
Static task
static1
Behavioral task
behavioral1
Sample
play.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
play.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
play.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
play.apk
-
Size
3.3MB
-
MD5
495c6f125cdf7000744754939c317dd1
-
SHA1
67f4772359774348a4571f4f2f5889bdd20eb428
-
SHA256
17a4c3bf778a3c82506e420151c64978f5bea83bb49947bc2d907bf530ac34e9
-
SHA512
ecb246d14f46d6e45d89dfe4a9116befbede05d6b623442967e0a6e1f8a51124dbd70c4a0ae07f3f3fdf722a17f39e722690437738e5d635697021c7223c99ef
-
SSDEEP
98304:/xePnBfIvlnIKjeemBoBqbrPtR6gEElDVn8rMaLWEEADBLxS4H:J0BQyAsKKrPtR6pElpn8waLWEbO4H
Malware Config
Extracted
hydra
http://fermankaygoscone.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral2/memory/4830-0.dex family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.dance.vintage/app_DynamicOptDex/rKk.json 4830 com.dance.vintage -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 59 ip-api.com -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD56939b1e327dfc7fb12a2525048e79629
SHA19cade1a973fb9d03e9e60725ce729cac6190a5cc
SHA2569268521108da189b2c4056512e79c2c5aca6164f23fac07843aab4480d3893b9
SHA5129e41163f8006a1adea403f06b0cbae0ff67e3d07397487285b57854b7d05f17b12945ec3a9c4af2e6694a7c8a326fe055d54ee13334dbd8b63dc228d04d96398
-
Filesize
4.4MB
MD593157c4f705712e8b6004b094c808424
SHA15a31ad317dd28216f71d0caeab8ac1f70c491905
SHA2564794d5481c97abba38e89a265dadbc9625ab004c53ea0c412b51e4b75f0e5dee
SHA51218c8fac3ceaaccaa821c0710a10e84da0b30d011e3ebb2eaa92fca586221a241cb23305d3032b334b104dde4c7fcd7db3c4c7fe2acb85926c158cba95d557907