Resubmissions

12-12-2023 15:01

231212-sd3ecafaan 10

11-12-2023 14:18

231211-rmn3mshaam 10

General

  • Target

    787d01d67c2a0d4df7f100c8550e92b3.apk

  • Size

    5.6MB

  • Sample

    231211-rmn3mshaam

  • MD5

    787d01d67c2a0d4df7f100c8550e92b3

  • SHA1

    e71d636f44d4b5240c1d743d2c3164ca7ee0fbb6

  • SHA256

    496e20eb04c7fb0fd64a1d3b519cb2515656e0486253f376176fdc996efebd16

  • SHA512

    a86c7c7ca152cf49273d3d157a04156a30e42b366b7ccbb2bf078cbdd7612862c8d520d1849f868c3dea26ea9f9951e2020686aa12eeff8f42457d554282b112

  • SSDEEP

    98304:jWvbn+hU4MIVGAxWWCICz95kP5zC/kRnvTzXDW640lfitWBacyjywQpHuGc4qL9l:JU2YnkRnHXDWx0RiQdyjynFAL9l

Malware Config

Targets

    • Target

      787d01d67c2a0d4df7f100c8550e92b3.apk

    • Size

      5.6MB

    • MD5

      787d01d67c2a0d4df7f100c8550e92b3

    • SHA1

      e71d636f44d4b5240c1d743d2c3164ca7ee0fbb6

    • SHA256

      496e20eb04c7fb0fd64a1d3b519cb2515656e0486253f376176fdc996efebd16

    • SHA512

      a86c7c7ca152cf49273d3d157a04156a30e42b366b7ccbb2bf078cbdd7612862c8d520d1849f868c3dea26ea9f9951e2020686aa12eeff8f42457d554282b112

    • SSDEEP

      98304:jWvbn+hU4MIVGAxWWCICz95kP5zC/kRnvTzXDW640lfitWBacyjywQpHuGc4qL9l:JU2YnkRnHXDWx0RiQdyjynFAL9l

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks