Resubmissions

20-12-2023 22:16

231220-16txnshbe2 10

20-12-2023 22:00

231220-1wvq8ahbb5 10

Analysis

  • max time kernel
    2302852s
  • max time network
    154s
  • platform
    android_x64
  • resource
    android-x64-20231215-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system
  • submitted
    20-12-2023 22:00

General

  • Target

    d37354a9ee083d1cc8d337cd4008231d303c763768c3fe2f443c7bb4ec184522.apk

  • Size

    3.2MB

  • MD5

    be81405574365c97fc0b3010cc039cad

  • SHA1

    5a7ff7b6998ae7de9a94d4fb5af4805b6eab4fb9

  • SHA256

    d37354a9ee083d1cc8d337cd4008231d303c763768c3fe2f443c7bb4ec184522

  • SHA512

    9e539cc62019eab99aecf02eb29b517467e257a46392c2da69831e4cf39818938d86c50c427a5afa4de743f073d2699275ed3ca14299e2b94545011854e93bbf

  • SSDEEP

    49152:+mZ5+Rb9KN9/QaJGiXNc9GUnDdYxU82S0lZYfvuXibOHh4K4844qkGdWGNTc:dlJGiWYeD0U870lZs2XNB4Kp4LjTc

Malware Config

Extracted

Family

hydra

C2

http://cioroapapoldoapolawe.org

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra payload 2 IoCs
  • Makes use of the framework's Accessibility service 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Reads information about phone network operator.

Processes

  • com.doll.cross
    1⤵
    • Makes use of the framework's Accessibility service
    • Loads dropped Dex/Jar
    PID:4923

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.doll.cross/app_DynamicOptDex/oat/rmDMM.json.cur.prof

    Filesize

    1KB

    MD5

    7247ff38973f2bf34977b9f8dfbfc503

    SHA1

    fb4de8367188e26d0f28450cf73723e32be60982

    SHA256

    6c59a2116757295add4e5f7ce73d511e069a2fcbbd7ebfb7646bc4e6cebfbbf3

    SHA512

    75f817c3496cd09f564b992db6b130a45e64e37cf2752c4d72fa66beed72bf91c420883c5b6d7df31f44f01c6feb6e8ee8b7871f0d5c447b3e9c0420654a37df

  • /data/data/com.doll.cross/app_DynamicOptDex/rmDMM.json

    Filesize

    1.6MB

    MD5

    a1dbe9b933d6f3d4cd7b98112d5e02cc

    SHA1

    29b2b90c77c9a8c47b0af7e76424c44129b51f7f

    SHA256

    234070560b50446a239795f6f850d7bb15bdc6e1bd808304627e5043c23aa289

    SHA512

    2c0f98bc377d2fd123391e4bd4711658b620e570721bad04e2c505ed461e44c8d8dc06be636f415581076aee0b2ce3304d2ce59f69fdd1924815a21efae9c00d

  • /data/data/com.doll.cross/app_DynamicOptDex/rmDMM.json

    Filesize

    1.6MB

    MD5

    02699b682e0aa8c1c3222a5bf56b442a

    SHA1

    ccacd7fff021fa43ec4c3a38fd56a04f80a6797f

    SHA256

    b39149ab73a76f84dddcb8fc2e2191b82a60fbef337460186264b54ab6298bfc

    SHA512

    5ebb9cf5e3b81810fa9dce8ce77f682009d562778f3ecc5cf1e123c42fce4c27d22b674fee5f00c5472410eb8028f45871bfbbf475e5580d4329108b18e54a7d

  • /data/user/0/com.doll.cross/app_DynamicOptDex/rmDMM.json

    Filesize

    4.4MB

    MD5

    7eb3a44802ceef8f67ac39fa5a2fca84

    SHA1

    dbfdb898d194e2be0d746332def8c841341d47dc

    SHA256

    b491067b9dca0dbdfd07efbebbd5e683942645b5a11aaf5f2380060ec767d414

    SHA512

    9441bac47d0685cc19c09fe7bab34044b86bd5b52f388a5ad643428c1af4483c46c1fe9b29277c230fece2ab95ddfef4dafc99ee79e7a759c80429f1ce83ba75