Overview
overview
10Static
static
7b59d430797...fc.apk
android-9-x86
10b59d430797...fc.apk
android-10-x64
10b59d430797...fc.apk
android-11-x64
10bootstrap.min.js
windows7-x64
1bootstrap.min.js
windows10-2004-x64
1epl1.html
windows7-x64
1epl1.html
windows10-2004-x64
1gpl_3.html
windows7-x64
1gpl_3.html
windows10-2004-x64
1howto.html
windows7-x64
1howto.html
windows10-2004-x64
1jquery-2.1.1.min.js
windows7-x64
1jquery-2.1.1.min.js
windows10-2004-x64
1keyboard.js
windows7-x64
1keyboard.js
windows10-2004-x64
1mit.html
windows7-x64
1mit.html
windows10-2004-x64
1mpl2.html
windows7-x64
1mpl2.html
windows10-2004-x64
1mraid.js
windows7-x64
1mraid.js
windows10-2004-x64
1mraid3.js
windows7-x64
1mraid3.js
windows10-2004-x64
1omsdk-v1.js
windows7-x64
1omsdk-v1.js
windows10-2004-x64
1privacypolicy.html
windows7-x64
1privacypolicy.html
windows10-2004-x64
1ui.js
windows7-x64
1ui.js
windows10-2004-x64
1Analysis
-
max time kernel
1091924s -
max time network
155s -
platform
android_x86 -
resource
android-x86-arm-20230831-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20230831-enlocale:en-usos:android-9-x86system -
submitted
13-10-2023 04:44
Static task
static1
Behavioral task
behavioral1
Sample
b59d43079747f8f280d0f2080cbee060e9fb7d3e0ccdd2882f6f5ffcac350efc.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
b59d43079747f8f280d0f2080cbee060e9fb7d3e0ccdd2882f6f5ffcac350efc.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
b59d43079747f8f280d0f2080cbee060e9fb7d3e0ccdd2882f6f5ffcac350efc.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
bootstrap.min.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
bootstrap.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
epl1.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
epl1.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
gpl_3.html
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
gpl_3.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
howto.html
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
howto.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
jquery-2.1.1.min.js
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
jquery-2.1.1.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
keyboard.js
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
keyboard.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
mit.html
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
mit.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
mpl2.html
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
mpl2.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
mraid.js
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
mraid.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
mraid3.js
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
mraid3.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
omsdk-v1.js
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
omsdk-v1.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral26
Sample
privacypolicy.html
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
privacypolicy.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
ui.js
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
ui.js
Resource
win10v2004-20230915-en
General
-
Target
b59d43079747f8f280d0f2080cbee060e9fb7d3e0ccdd2882f6f5ffcac350efc.apk
-
Size
3.2MB
-
MD5
28e8e9410267495b26dac4e384d7d738
-
SHA1
35e4c10b45c3354a32cd8e57bf1884e06a42988b
-
SHA256
b59d43079747f8f280d0f2080cbee060e9fb7d3e0ccdd2882f6f5ffcac350efc
-
SHA512
073140a03ee40e9589a40c0c9fff205c60e9aef333989ddda01aa43bf1e6cb708e756a00edc8ccd2b6fb9d247d17f0763c1603ff4b46226d0cf4c45e583a4c99
-
SSDEEP
98304:WeBihQKs25/JKqFA3jA0VQMULcIyEJmdzFTUFqdtCryR:XZkKqF6A0VQ7JyEJGzmqvCGR
Malware Config
Extracted
hydra
http://polkamoturnos.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 4 IoCs
Processes:
resource yara_rule /data/user/0/com.virus.medal/app_DynamicOptDex/rFaq.json family_hydra1 /data/user/0/com.virus.medal/app_DynamicOptDex/rFaq.json family_hydra2 /data/user/0/com.virus.medal/app_DynamicOptDex/rFaq.json family_hydra1 /data/user/0/com.virus.medal/app_DynamicOptDex/rFaq.json family_hydra2 -
Makes use of the framework's Accessibility service. 2 IoCs
Processes:
com.virus.medaldescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.virus.medal Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.virus.medal -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.virus.medal/app_DynamicOptDex/rFaq.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.virus.medal/app_DynamicOptDex/oat/x86/rFaq.odex --compiler-filter=quicken --class-loader-context=&com.virus.medalioc pid process /data/user/0/com.virus.medal/app_DynamicOptDex/rFaq.json 4201 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.virus.medal/app_DynamicOptDex/rFaq.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.virus.medal/app_DynamicOptDex/oat/x86/rFaq.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.virus.medal/app_DynamicOptDex/rFaq.json 4172 com.virus.medal -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.virus.medaldescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.virus.medal -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 27 ip-api.com 28 ip-api.com -
Reads information about phone network operator.
Processes
-
com.virus.medal1⤵
- Makes use of the framework's Accessibility service.
- Loads dropped Dex/Jar
- Requests enabling of the accessibility settings.
PID:4172 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.virus.medal/app_DynamicOptDex/rFaq.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.virus.medal/app_DynamicOptDex/oat/x86/rFaq.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4201
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ee780e01d4f7eae05850a03000fdb5ca
SHA1301293f918fdaf77a4d91d99582f520b65e4f5f9
SHA25642019e737e02b2cfad38b70a3b5fa0874f5558a2684525b87c46e1fc720cc4ce
SHA512604de7d58dd2836c3bdadf57d1f6067b5111903339e683c44a353931e8caffb18e846d8f12f513345b89b3f65a66028210822e2d812e3958276efce600491d28
-
Filesize
1.3MB
MD50a2754a0222186176cc7093cd5ca13da
SHA1325223f01d6ce06092a87b44dc4a5ce32fe09226
SHA256e58e8fad7b8904f7e950ee3b0577a93fd0bc25c5a7974d823dd9a468ed057120
SHA5120467e4389e67283c4389e5b04b35a2c29910b27a41b3c97bdc463614b71d809d3bfdf2259b2c6bdb5cbf6ff61b3e86e5435847a2db60d9c7af12384071c82800
-
Filesize
1.3MB
MD56f8d0c43ba928b1362a744b37322c4ed
SHA18ce9cff444a2a394939c71c0f2d98743a57a104e
SHA256f6a4e0a1eaee870d7224f7d9455dd4775d3ef6a65eb63d0b4261c3bc785e4329
SHA512c64ceefaab1af30716bebc4ed00a8b3af69d7f9f0d3e83f224565d1ed1737b153eb9b088171799bdafe7735bba186fd53ff11669c45c9297639b3e7a90990523
-
Filesize
3.6MB
MD569caa044aa8182d795f0d53c4e90025e
SHA1c84683c65911d78bc89b3f047a70984666980945
SHA256b4c743a75e1bc375fee5c148c454500f3ec1074fdfc522e950bd5c01a8049dde
SHA512c80b8bc2fe05c215263725fbcab70b39aaf4793dc6ab70fb4b5202a6086cdb0e52cf90cbe2dbeab0f1717e25b054219bdc10478eb258d0918595d070ba1e366c
-
Filesize
3.6MB
MD5117cdf3d73499a5cda6d1f361b37712f
SHA1c45bd1aaae9da1bc6e064eb83a95e99196f827ed
SHA256a65a79a43f77cb8ce44d674b0285012f059c41501825f881e8ddc53f4d47268a
SHA512572549870c72fad3cd88f08dd9602ba265213ec11119a4d5e1c86da2e3c6dc1b66fc893496f5a936356e380016c52cdb0d1f7eb5933e8793a98450aa587d37ec