Analysis

  • max time kernel
    2459888s
  • max time network
    164s
  • platform
    android_x64
  • resource
    android-x64-20231215-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system
  • submitted
    20-12-2023 08:55

General

  • Target

    989b61c69e7bbb1c50a8661975ccb723aa60856b2666c549e0a9f22191d09d8f.apk

  • Size

    6.7MB

  • MD5

    0ba895632674c1245059731ccb03e043

  • SHA1

    e4d7f3fcf8836d5c9ea78185b609cc4cb2b97ebc

  • SHA256

    989b61c69e7bbb1c50a8661975ccb723aa60856b2666c549e0a9f22191d09d8f

  • SHA512

    3bb5eb1ab608027cb54c8507fc1c8c87d92e898bf80fe7f70b94ddb962e65d4f7831b53188c3cc4340619580b95920926e94e09f8633df0eae7027d6543c60ef

  • SSDEEP

    196608:s79hBGkJfS+qlDrsyCnhx86A74kCqrMh2yN3:KhBGifHq1syChxHA7yl223

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra payload 1 IoCs
  • Makes use of the framework's Accessibility service 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Reads information about phone network operator.

Processes

  • com.dqwoxlnl.sakiczm
    1⤵
    • Makes use of the framework's Accessibility service
    • Loads dropped Dex/Jar
    PID:5001

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.dqwoxlnl.sakiczm/hgigUiF8pt/faIGTky68gIIeyg/tmp-base.apk.giGkIUG8666843874940848886.pyi
    Filesize

    164KB

    MD5

    aa345ca2089088104ce53af875a227c2

    SHA1

    9e962c4cb5bf63f4c55492a2320e0b9d5d6e3ace

    SHA256

    c7b89ed74893af7ebc7c8a700ee8f387afdf14d563d49875e35188cf42a21234

    SHA512

    b3f612167103458da75853bfda460718a31e1fc0e8b19fb44e5154fda1a9037a7c5558dc6fc2940f1aad73c14b6991406773844f2d9c090bb5b3d292b7047c64

  • /data/user/0/com.dqwoxlnl.sakiczm/hgigUiF8pt/faIGTky68gIIeyg/base.apk.giGkIUG1.pyi
    Filesize

    7.4MB

    MD5

    32c21a89d1072b216671fdb43808e8fe

    SHA1

    ac003cc26ceb130b99709d2d295d57308c36f1b7

    SHA256

    42f698ce150190e625b1385bb8ea9a48c93dadcd181246aa875ff29d9d4548ac

    SHA512

    e010832a898b2439db3b6238fab7599a4c4e84e98a813c1d9e0fb7a8f1d87908013b67173f9006a713445af566d1735c677c8ae272415fd4f31ff827a7bb21ca