Analysis
-
max time kernel
1586302s -
max time network
54s -
platform
android_x86 -
resource
android-x86-arm-20231211-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231211-enlocale:en-usos:android-9-x86system -
submitted
12-12-2023 15:01
Behavioral task
behavioral1
Sample
787d01d67c2a0d4df7f100c8550e92b3.apk
Resource
android-x64-arm64-20231211-en
Behavioral task
behavioral2
Sample
787d01d67c2a0d4df7f100c8550e92b3.apk
Resource
android-33-x64-arm64-20231211.1-en
Behavioral task
behavioral3
Sample
787d01d67c2a0d4df7f100c8550e92b3.apk
Resource
android-x86-arm-20231211-en
General
-
Target
787d01d67c2a0d4df7f100c8550e92b3.apk
-
Size
5.6MB
-
MD5
787d01d67c2a0d4df7f100c8550e92b3
-
SHA1
e71d636f44d4b5240c1d743d2c3164ca7ee0fbb6
-
SHA256
496e20eb04c7fb0fd64a1d3b519cb2515656e0486253f376176fdc996efebd16
-
SHA512
a86c7c7ca152cf49273d3d157a04156a30e42b366b7ccbb2bf078cbdd7612862c8d520d1849f868c3dea26ea9f9951e2020686aa12eeff8f42457d554282b112
-
SSDEEP
98304:jWvbn+hU4MIVGAxWWCICz95kP5zC/kRnvTzXDW640lfitWBacyjywQpHuGc4qL9l:JU2YnkRnHXDWx0RiQdyjynFAL9l
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.ahzmpwhp.mpjvegkdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ahzmpwhp.mpjvegk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ahzmpwhp.mpjvegk -
Loads dropped Dex/Jar 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.ahzmpwhp.mpjvegk/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ahzmpwhp.mpjvegk/app_apkprotector_dex/xvg6Fh1Q.insta --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ahzmpwhp.mpjvegk/app_apkprotector_dex/oat/x86/xvg6Fh1Q.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/com.ahzmpwhp.mpjvegk/app_apkprotector_dex/xvg6Fh1Q.insta 4237 com.ahzmpwhp.mpjvegk /data/user/0/com.ahzmpwhp.mpjvegk/app_apkprotector_dex/xvg6Fh1Q.insta 4264 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ahzmpwhp.mpjvegk/app_apkprotector_dex/xvg6Fh1Q.insta --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ahzmpwhp.mpjvegk/app_apkprotector_dex/oat/x86/xvg6Fh1Q.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.ahzmpwhp.mpjvegk/app_apkprotector_dex/xvg6Fh1Q.insta 4237 com.ahzmpwhp.mpjvegk -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Reads information about phone network operator.
Processes
-
com.ahzmpwhp.mpjvegk1⤵
- Makes use of the framework's Accessibility service
- Loads dropped Dex/Jar
PID:4237 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ahzmpwhp.mpjvegk/app_apkprotector_dex/xvg6Fh1Q.insta --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ahzmpwhp.mpjvegk/app_apkprotector_dex/oat/x86/xvg6Fh1Q.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4264
-
-
/system/bin/ndk_translation_program_runner_binfmt_misc /data/user/0/com.ahzmpwhp.mpjvegk/app_torfiles/tor /data/user/0/com.ahzmpwhp.mpjvegk/app_torfiles/tor -f /data/user/0/com.ahzmpwhp.mpjvegk/app_torfiles/torrc __OwningControllerProcess 42372⤵PID:4309
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5a4f330ab58c31061357899b67cd181f1
SHA1f16eba4f6a2a357132dc3446a20d807ec2addce0
SHA2563c09a04f580acd0a96df38d1c244637789de01ad442f9f4c73942275b419c1c2
SHA512915667babd17e19b7a247eb707123ed97a5bc95666949a870a38599d11b630c6cb61b4b963352c1ce95c4497f62524e9081ef0d9b477ce0b324e735b7acbc58e
-
Filesize
3.6MB
MD59034bbc5c769a2b2b1c676dd526083c6
SHA11bde3b7587f2be4dd582afad056d4761b4cc51ac
SHA256f502874b454f81ade0c2e7be87fd6f0f7751702b369d3f27b2c6b2eeff380c1d
SHA512786771e30384f03f820a00eabad95e1688a00c745694f104747e7aa11866b7b4fdc662c8298f5fc465e8e54aac0ae2693067123ff6531ac97e14eec9814d2b40
-
Filesize
1.2MB
MD50e3a337a1a508e918086d9f244ca4831
SHA19df8518145607042363ef820f58d776204a1506b
SHA25687a9505f964c5bc6287672ef2a3b05ee8b1d067d44484fa79ed7294840833bd4
SHA512f03ac7408a9f76bd7ab89c8e011942d25cb1fcef8041924188127948dcc7f3abc09892b53e8891fec1a115a6c6de3626234ec6deb0fa7a8c5329c0d853835a76
-
Filesize
1.2MB
MD52e32ea717d5b09fc870206e62c13ed25
SHA1a96e7fe2e8649859d1c4f5e6b7151df0e7573d6a
SHA25674c63098d4a25e251d2965c6dd2510dda17949ec63d61e6d3cbe93e727fba4ac
SHA51277480a9bd55be2dafe026a99a044345e422d6a637c8aa7f58e1a7d0396bb02e21243e1e987643f86738c6e5fab9c89c6306b096d91074e1059edf9a2a4782d3e