Analysis
-
max time kernel
154s -
max time network
154s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
29-01-2024 16:18
Static task
static1
Behavioral task
behavioral1
Sample
804a18c229614c92d0be806056ff8fe6.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
804a18c229614c92d0be806056ff8fe6.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
804a18c229614c92d0be806056ff8fe6.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral4
Sample
vk_dex.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral5
Sample
vk_dex.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral6
Sample
vk_dex.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
804a18c229614c92d0be806056ff8fe6.apk
-
Size
3.2MB
-
MD5
804a18c229614c92d0be806056ff8fe6
-
SHA1
c91f728bed9faa15223744e3e8bb859d9c6f624a
-
SHA256
45598745a90bac7335e21583bb5ee09e72a5beb47ab1d45f0ba3fdd0ddf2868b
-
SHA512
d4f6d44b9068216606a823e8f210b490d2045c95e40118fbe50fb347089d04694824c516a940ea0420f8f7c936c9d6bc35c4b7a56a2f33055031f32e800e1737
-
SSDEEP
98304:xEGhv1Jw1viCDMe0Y+0ivDDTrXDwufSQ3W38:x1h9JwhID3nfb3R
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.klfcspao.mqiahbd Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.klfcspao.mqiahbd -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.klfcspao.mqiahbd/code_cache/secondary-dexes/base.apk.classes1.zip 4987 com.klfcspao.mqiahbd -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Reads information about phone network operator.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.klfcspao.mqiahbd/code_cache/secondary-dexes/tmp-base.apk.classes1807388625444035347.zip
Filesize378KB
MD5601b246f6f001424b1eaeed72f5da461
SHA10f3171df201ecee15ac7e28c537c6bd3d5a4331c
SHA25676944e5e47149063360ac674e1e4ba78e904e2c8ba3aaf5fd7138c1de683bb8e
SHA512a4750e8b83cb88b0b42209b453a8254d67cd42c59d50d7b5a0795c2f7ae0f3ae386c997a46732e69873be015932fb8e14deb9d485776864e015619c67ea79393
-
Filesize
902KB
MD5135838d0eda1bbaa4150b05b19e65974
SHA1680c865108d3f9288985392c44bb79bc72df932b
SHA256070ae356eaa1e51f4cf16969f62286db8552f93c987d9a7db976f985d5e50aa8
SHA5124cecd4575738dbb0d012db66deb6ec08748425d0567d160168325e55bff0dc7248196c049224fe5f25dc9d6e9c14accccfac497c8d157e8832e64983ccbc54fe