Overview
overview
10Static
static
78319695f2a...64.apk
android-9-x86
108319695f2a...64.apk
android-10-x64
108319695f2a...64.apk
android-11-x64
10closebutton.html
windows7-x64
1closebutton.html
windows10-2004-x64
1core_wrapper.js
windows7-x64
1core_wrapper.js
windows10-2004-x64
1lynx_core.js
windows7-x64
1lynx_core.js
windows10-2004-x64
1nd
ubuntu-18.04-amd64
slardar_bridge.js
windows7-x64
1slardar_bridge.js
windows10-2004-x64
1slardar_sdk.js
windows7-x64
1slardar_sdk.js
windows10-2004-x64
1template.js
windows7-x64
1template.js
windows10-2004-x64
1Analysis
-
max time kernel
1845241s -
max time network
156s -
platform
android_x64 -
resource
android-x64-arm64-20230621-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20230621-enlocale:en-usos:android-11-x64system -
submitted
19-07-2023 11:46
Static task
static1
Behavioral task
behavioral1
Sample
8319695f2a7a4c2f6050d922dd1760a5e8731064.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
8319695f2a7a4c2f6050d922dd1760a5e8731064.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
8319695f2a7a4c2f6050d922dd1760a5e8731064.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
closebutton.html
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
closebutton.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
core_wrapper.js
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
core_wrapper.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
lynx_core.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
lynx_core.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
nd
Resource
ubuntu1804-amd64-20230621-en
Behavioral task
behavioral11
Sample
slardar_bridge.js
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
slardar_bridge.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
slardar_sdk.js
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
slardar_sdk.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
template.js
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
template.js
Resource
win10v2004-20230703-en
General
-
Target
8319695f2a7a4c2f6050d922dd1760a5e8731064.apk
-
Size
3.2MB
-
MD5
e8e83c7e5094b7510e0a738a7fbafd6c
-
SHA1
8319695f2a7a4c2f6050d922dd1760a5e8731064
-
SHA256
cd3ff09b5070985a0797738743b1c62233918666b888dc4867cec9aa82cc5505
-
SHA512
8d4630f89b6e5ed1211d4caff57ef01570860c0b42db1365487e6ec8c86236d756624f9d4a5e924b5558b3134e64a89385705a31ce4dea8f53cc69bd0c616e9b
-
SSDEEP
98304:ZOh9u96MP1iXw8oHjEdQP6H5XJlNeG+tyD9toGhTWbBGZbRUIb3tgEjk:ZOhQ1qqmlD20Z1hDtdg
Malware Config
Extracted
hydra
http://91.215.85.203
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral3/memory/4385-0.dex family_hydra -
Makes use of the framework's Accessibility service. 2 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.camp.make Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.camp.make -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.camp.make/app_DynamicOptDex/UtumQ.json 4385 com.camp.make -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 61 ip-api.com -
Reads information about phone network operator.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
973KB
MD50e998c089232c1696b2cb09ffa288c73
SHA115933c3c68f27851b7653d98448c2690d547d89f
SHA2569d6d36afd649eae6ef499f235335cdd1d765ed7adf2a3fd32e1ecce2a3ff6e2a
SHA512aae8c5ec6f6c8c894a870886471731dd6a841a4bfeeb6b2e67fa801150c73b52ce278f5c87fd80363a141173122ce320ad6ef19a05aed10e06b445b0fc732071
-
Filesize
2.2MB
MD5f9678f76ba4f3ec181a6108a81a0adb6
SHA1af840ad30c50671085a7c692d449ccf41eeaaa49
SHA25691492ad501be4adc17742f00b91e71e28c26d734a0d6fe029febdca3d8af2780
SHA5126d32d18a008fca4ca73e793cacfb9e16bc8cd80dc83d3f43f736f9e49fe6e8512d7513b58a06f7947cea3af88b8cfa9d60734038aca7c90157bd420138e13dd4
-
Filesize
974KB
MD53baeaa766ea7f31a9147208efd957c75
SHA1c701de3d0e55425394ccbf8e0967639e86f3c54e
SHA25675e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d
SHA5129f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f