Resubmissions

26-06-2023 10:30

230626-mka1sahd53 7

26-06-2023 10:29

230626-mjhn8sac5s 7

12-06-2023 16:29

230612-tzc71sde6y 10

General

  • Target

    9490778dd7a5afd4bf14bd6d9dee3607a00567e1372f9b966137cbcf58caf01e

  • Size

    7.3MB

  • Sample

    230612-tzc71sde6y

  • MD5

    00f8ce61a92691c2be7b4823b5cfd0de

  • SHA1

    c9c1022b744edabab8a1ce654ffc84b10ca4a832

  • SHA256

    9490778dd7a5afd4bf14bd6d9dee3607a00567e1372f9b966137cbcf58caf01e

  • SHA512

    c8264b75a61293fd14cc21162f9697c9dbe0269e8966a8ad5c9c142caac2b4ef9f4e1d49b28ceb8b2a040acc32fa007d651284b8c10d0f62f45fc44ad4f6ca58

  • SSDEEP

    98304:7n4DIojOvRLPi+BUuXj+53DG7IDpuAnnOyFBMHYgnd4ymIsn/h8t8TKWRvchJAZ4:7xousuXwPpuMCY4dLvsnZBKgSXyTjcVl

Malware Config

Targets

    • Target

      9490778dd7a5afd4bf14bd6d9dee3607a00567e1372f9b966137cbcf58caf01e

    • Size

      7.3MB

    • MD5

      00f8ce61a92691c2be7b4823b5cfd0de

    • SHA1

      c9c1022b744edabab8a1ce654ffc84b10ca4a832

    • SHA256

      9490778dd7a5afd4bf14bd6d9dee3607a00567e1372f9b966137cbcf58caf01e

    • SHA512

      c8264b75a61293fd14cc21162f9697c9dbe0269e8966a8ad5c9c142caac2b4ef9f4e1d49b28ceb8b2a040acc32fa007d651284b8c10d0f62f45fc44ad4f6ca58

    • SSDEEP

      98304:7n4DIojOvRLPi+BUuXj+53DG7IDpuAnnOyFBMHYgnd4ymIsn/h8t8TKWRvchJAZ4:7xousuXwPpuMCY4dLvsnZBKgSXyTjcVl

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks