Overview
overview
10Static
static
7a579740321...2e.apk
android-9-x86
10a579740321...2e.apk
android-10-x64
10a579740321...2e.apk
android-11-x64
10closebutton.html
windows7-x64
1closebutton.html
windows10-2004-x64
1core_wrapper.js
windows7-x64
1core_wrapper.js
windows10-2004-x64
1lynx_core.js
windows7-x64
1lynx_core.js
windows10-2004-x64
1nd
ubuntu-18.04-amd64
slardar_bridge.js
windows7-x64
1slardar_bridge.js
windows10-2004-x64
1slardar_sdk.js
windows7-x64
1slardar_sdk.js
windows10-2004-x64
1template.js
windows7-x64
1template.js
windows10-2004-x64
1Analysis
-
max time kernel
3610501s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20230621-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20230621-enlocale:en-usos:android-9-x86system -
submitted
08-08-2023 22:07
Static task
static1
Behavioral task
behavioral1
Sample
a579740321f64306036e443e4c66ec593c4e447ad7a5c97e26610e4afa0fe62e.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
a579740321f64306036e443e4c66ec593c4e447ad7a5c97e26610e4afa0fe62e.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
a579740321f64306036e443e4c66ec593c4e447ad7a5c97e26610e4afa0fe62e.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
closebutton.html
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
closebutton.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
core_wrapper.js
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
core_wrapper.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
lynx_core.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
lynx_core.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
nd
Resource
ubuntu1804-amd64-20230621-en
Behavioral task
behavioral11
Sample
slardar_bridge.js
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
slardar_bridge.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
slardar_sdk.js
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
slardar_sdk.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
template.js
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
template.js
Resource
win10v2004-20230703-en
General
-
Target
a579740321f64306036e443e4c66ec593c4e447ad7a5c97e26610e4afa0fe62e.apk
-
Size
3.0MB
-
MD5
433a4354307147bf6cd3dedaabf04fc6
-
SHA1
da7209e77124a947756df383f66d3c1fe0e1f56d
-
SHA256
a579740321f64306036e443e4c66ec593c4e447ad7a5c97e26610e4afa0fe62e
-
SHA512
26e3cfb378463b8ff852b5c3f1e69eb6c3e3f83b9382440ca02646c2a93be4ecdee90c0e40d9658d1147156ae552ff02fa7a070672014fc4b9023e16120c801d
-
SSDEEP
98304:Avapba+oXR6opVZjEsQTTHBXvQNIU1IhmS0eOtcZdMtFDMdpxXEjK:Ava1obO9mXeWcZdMIxU+
Malware Config
Extracted
hydra
http://beedoris.top/
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 2 IoCs
resource yara_rule behavioral1/memory/4145-0.dex family_hydra behavioral1/memory/4095-0.dex family_hydra -
Makes use of the framework's Accessibility service. 2 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.card.path Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.card.path -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.card.path/app_DynamicOptDex/Uena.json 4145 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.card.path/app_DynamicOptDex/Uena.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.card.path/app_DynamicOptDex/oat/x86/Uena.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.card.path/app_DynamicOptDex/Uena.json 4095 com.card.path -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 38 ip-api.com -
Reads information about phone network operator.
Processes
-
com.card.path1⤵
- Makes use of the framework's Accessibility service.
- Loads dropped Dex/Jar
PID:4095 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.card.path/app_DynamicOptDex/Uena.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.card.path/app_DynamicOptDex/oat/x86/Uena.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4145
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
973KB
MD5749623c3396b8a5ee752dc64dbf90d7f
SHA1cff7e27c13d447ec82729963cc6c554e41565481
SHA2566d2f377836f61df4fa7e636a2377cc478a4910fe502266e817631858d3540f48
SHA5125147e4e0ce35330a8342e05f8dc9739fa0de5880b622641c1323130672d7f3b0b0b2c4b3e21edc91ecba56933f6b97bc8463360412d172256b79918f00dabe72
-
Filesize
2.2MB
MD5d24d26e28b34568f56f13135ecf97910
SHA1f04d01c60dd2cc834c568a040ce09494d83f4a81
SHA256273fac0d2cfbd44b15bc50d518d034db0b5ccd0db3724bef690594041baf9c0c
SHA5123751aacfe091eea49ebe60f4fa50fae40e458419f08e35e017d05a30cb126993fba5960b2f8b09e1b4039f147efe8154f3f68d755f094a60961fe7ece139dfaf
-
Filesize
2.2MB
MD503e60fe75a49d207705dda6c68ce3880
SHA1427cb5c34b6dbcd140e7d0e3990819e20247d347
SHA2568fe4ea7cd83f2e06d86ca7897906523566d1566c7a8447f8df15133109002fe2
SHA5122a6efa31ea624dc6ea7401a71920df77cbe1f685b5d20a2a2570211875a301ba081063fb64bec8c52deaf97b5c498b704312f209352877ee58da4c084a418c6a