Overview
overview
10Static
static
7b8285714c6...9b.apk
android-9-x86
10b8285714c6...9b.apk
android-10-x64
10b8285714c6...9b.apk
android-11-x64
10disney.js
windows7-x64
1disney.js
windows10-2004-x64
1googlephoto.js
windows7-x64
1googlephoto.js
windows10-2004-x64
1hbomax.js
windows7-x64
1hbomax.js
windows10-2004-x64
1netflix.js
windows7-x64
1netflix.js
windows10-2004-x64
1web.js
windows7-x64
1web.js
windows10-2004-x64
1Analysis
-
max time kernel
3106949s -
max time network
94s -
platform
android_x64 -
resource
android-x64-20230621-en -
resource tags
androidarch:x64arch:x86image:android-x64-20230621-enlocale:en-usos:android-10-x64system -
submitted
03-08-2023 02:16
Static task
static1
Behavioral task
behavioral1
Sample
b8285714c61aabe540aa39221cd2dadba04a389919e554d531604d8bded2359b.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
b8285714c61aabe540aa39221cd2dadba04a389919e554d531604d8bded2359b.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
b8285714c61aabe540aa39221cd2dadba04a389919e554d531604d8bded2359b.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
disney.js
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
disney.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
googlephoto.js
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
googlephoto.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
hbomax.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
hbomax.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
netflix.js
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
netflix.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
web.js
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
web.js
Resource
win10v2004-20230703-en
General
-
Target
b8285714c61aabe540aa39221cd2dadba04a389919e554d531604d8bded2359b.apk
-
Size
4.1MB
-
MD5
0d37a9b5ae1454c3fcbf379963d38b5d
-
SHA1
c5315746876ce5a7f9edd9280ea426fa1b2cc8de
-
SHA256
b8285714c61aabe540aa39221cd2dadba04a389919e554d531604d8bded2359b
-
SHA512
abe10446992c4d599b366f7bf02a122f81f2fed614b16983b1d1aa6dcfc57867be5e5dd464ceed49b057bf0535c054086c332394a43fa14c74346a7e08b8d84e
-
SSDEEP
98304:nwsTYmUzC4rZfYdfGaCl2gzARpSOCyNx9vLrqmp:NPGjaCl2Bp5Tb9vXqmp
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral2/memory/4937-0.dex family_hydra -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.such.joy/app_DynamicOptDex/CSUSr.json 4937 com.such.joy -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 43 ip-api.com 46 ip-api.com -
Reads information about phone network operator.
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5269818a613e8c54603408cd6cacff76c
SHA1d13b9f625ba0a006cfbca3c313ca9a2b57eb267c
SHA256238b95abe6597582674aa66f9383179860a5a29aac6e6d6ffe6a3ea03cfbdbbc
SHA512ea6309c040a7318401958ffcfd8a1227fa2ad2c766f8f33fca03c0304d1b1539da11a0bb448b3028d82955bfe2181ff2005021ac4b63064721d6f5ad7047688a
-
Filesize
5.0MB
MD533c7c9950172a836259776101bcac096
SHA1f5c8598a28eec0bebf7e07fc23512c89b30472d6
SHA256dc302c0fd08473b5916fc3d26a8035df332391d9535da610c52fcb2ec48d55ef
SHA51275b0ed13a94fabe307c48971cf13150c9c3ab9f4c4128bcb1d71519b4d2aff2221f72e7174970b468ff00b09ad9c9ac613e6de586668fc6f9ed085366b35286d
-
Filesize
131B
MD57345be375d0cad0eb637c1839471ba6a
SHA1e0a7e4c97a13156f2b80b0c92b92429fba2a8e99
SHA25682be48a9ad6e61cfa69c4dc864c931968d2d52b5e07b2f984eb23f8ab40f2b48
SHA512f5fbc5fbd9b6cad639fc0ce10feec18889a10835022ed14ed1df27d547314de29f87728d49527e19b3d3d136612c324a5214dcac489dd4f1ec3feed0930d4b2c