Analysis
-
max time kernel
3314367s -
max time network
144s -
platform
android_x86 -
resource
android-x86-arm-20231023-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231023-enlocale:en-usos:android-9-x86system -
submitted
12-11-2023 22:00
Static task
static1
Behavioral task
behavioral1
Sample
527d81766a0d37a117b7d38938ee88adea64ba99e44cd47f534d2fef1360a90b.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
527d81766a0d37a117b7d38938ee88adea64ba99e44cd47f534d2fef1360a90b.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
527d81766a0d37a117b7d38938ee88adea64ba99e44cd47f534d2fef1360a90b.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
libcrashyltics.so
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral5
Sample
zoom_app_sdk.js
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
zoom_app_sdk.js
Resource
win10v2004-20231020-en
General
-
Target
527d81766a0d37a117b7d38938ee88adea64ba99e44cd47f534d2fef1360a90b.apk
-
Size
2.9MB
-
MD5
37184e75d764b25208619ac89960103d
-
SHA1
4dfdd81923c82bdd7182b8d4377968e655e976d2
-
SHA256
527d81766a0d37a117b7d38938ee88adea64ba99e44cd47f534d2fef1360a90b
-
SHA512
9d304b3adda32a5fd51e0522e8605d360f3ac5b5be93934ed5ea4374ad91411e41d6674ed1d10c13f7ef4941c623df229a595bef569e3da821cae90e193c45fe
-
SSDEEP
49152:6iU00JGitbPPuJzkHxR2M+bnd3mjitA28GxT/TgTORLJ5hj1s/z1Q/QXo:yJGitqJzk94ntm2TXxIORLsb1Q/T
Malware Config
Extracted
hydra
http://cioroapapoldoapolawe.org
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 4 IoCs
resource yara_rule behavioral1/memory/4272-0.dex family_hydra1 behavioral1/memory/4272-0.dex family_hydra2 behavioral1/memory/4246-0.dex family_hydra1 behavioral1/memory/4246-0.dex family_hydra2 -
Makes use of the framework's Accessibility service. 2 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.vicious.depth Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.vicious.depth -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.vicious.depth/app_DynamicOptDex/ORIj.json 4272 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.vicious.depth/app_DynamicOptDex/ORIj.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.vicious.depth/app_DynamicOptDex/oat/x86/ORIj.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.vicious.depth/app_DynamicOptDex/ORIj.json 4246 com.vicious.depth -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.vicious.depth
Processes
-
com.vicious.depth1⤵
- Makes use of the framework's Accessibility service.
- Loads dropped Dex/Jar
- Requests enabling of the accessibility settings.
PID:4246 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.vicious.depth/app_DynamicOptDex/ORIj.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.vicious.depth/app_DynamicOptDex/oat/x86/ORIj.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4272
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD520ebec3a6c0d83497989fdc844a7b266
SHA18b810af9756caef62efd48ca2be6ff6ef9062caf
SHA256497321a931c799fcc61094307665e7f9fcb26324b5240bb5e99b7a6a7e30c68b
SHA51278f4311f422fb66ba89efd3f157bf3e6faaa5d2e2bb6d1d1a6aa2007c5aec82b8682c557b0010033cba8863aa79823d41f29fc2cd3cc33cf92bdc44719431f71
-
Filesize
1.6MB
MD5c104d679805c0473fd154195e7ba80cf
SHA1763e3ac1f15713438dd9c608f6f94f29a3472607
SHA25600ad423ab487c8a4e7309c798c4a7a5b20648fcbcc0bd3f1ba2d8f777e1048db
SHA512d813af0471a6fb110e049db041a693895791f5d4969a0faf9185fe64cc3685eceabffcc913cba434afbe8cbfa848abd54d81caf2a867ad6468e3ad723e1e14c0
-
Filesize
659B
MD56d651f8e4f4775759fde641c99a1d725
SHA172881e52163d058e2078db4ea6bf3b5c7f1f0e3a
SHA256f01b1dfd0df46c9125c6d1b30541ebca90584f7acea31713cd1434d0002a89cf
SHA512261ce10650d9abeddc7eee16a037cd6ca21c9ea47912bd7f8f04a8c94831125ed44161b639f026565c9e8221bc5560f0c8b6201411bccce0dc8661912ecf4698
-
Filesize
4.4MB
MD5dd0049919780df9deb16ef4c246c8165
SHA18752e62f2a41180088a80c30931dfa99c05e4e29
SHA2560a5290092b2307e5b02753986e7f70b08613d3076ab24bdf27191c7ddf443afd
SHA51238ab55944bf166abe84f7fd55815a6ff3c46a5e3a440ae9b3fd37131ce3950929a772cae1175334942f2c07aef4e071e973ba98faf7a8b2d8d875658b0798a2e
-
Filesize
4.4MB
MD593732af40fb03e352577e250a3500f8a
SHA108e3c3aab7524d770cbcdf597d043796c4578316
SHA2568cd199f412b8bcfcd9dc4d8957e5d74d31348f43b3363729aa1402ba18d1d227
SHA51255efaec342acb6a409e6fff8b15663e39ba8f366bf1aababa2ccf7b757f29c1fa9ee6ed36680a599d52d868090698c2f424c969a9da4a88c97c78b5e2329f990