General

  • Target

    73aba6b6c688afa8b5fbe41d3d30c4d15d49881a06c7a1ee81b2f48306bd2898.bin

  • Size

    3.5MB

  • Sample

    231009-1y7hssgf81

  • MD5

    fe629349652c9bbbc1d7e1515eb8e6d9

  • SHA1

    f2f7cb5b259d571976f849195784d9ad47b0bf6c

  • SHA256

    73aba6b6c688afa8b5fbe41d3d30c4d15d49881a06c7a1ee81b2f48306bd2898

  • SHA512

    03a13277df89a16ad2050c314b3af6991c716b6841fc89ac199b67837162850654ffda0c058689dbe3b521b1b7862c5e7baa3507ab8bdff1f3a38b91619aca13

  • SSDEEP

    98304:oOTkG0SUocakE2gQ57SJg0ewcGSMltzcrCM37CAHy+UsFVxLej7:taroctE2gQ57SJgecGLLeCwL0cvLeX

Malware Config

Extracted

Family

hydra

C2

http://qjrqkrklrwellwej.online

Targets

    • Target

      73aba6b6c688afa8b5fbe41d3d30c4d15d49881a06c7a1ee81b2f48306bd2898.bin

    • Size

      3.5MB

    • MD5

      fe629349652c9bbbc1d7e1515eb8e6d9

    • SHA1

      f2f7cb5b259d571976f849195784d9ad47b0bf6c

    • SHA256

      73aba6b6c688afa8b5fbe41d3d30c4d15d49881a06c7a1ee81b2f48306bd2898

    • SHA512

      03a13277df89a16ad2050c314b3af6991c716b6841fc89ac199b67837162850654ffda0c058689dbe3b521b1b7862c5e7baa3507ab8bdff1f3a38b91619aca13

    • SSDEEP

      98304:oOTkG0SUocakE2gQ57SJg0ewcGSMltzcrCM37CAHy+UsFVxLej7:taroctE2gQ57SJgecGLLeCwL0cvLeX

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks