Analysis
-
max time kernel
178s -
max time network
185s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
04-08-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
60d897552b97f3674000a6251cf3eea86cf37ff40a0d3a647a84e1bb1228eb36.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
60d897552b97f3674000a6251cf3eea86cf37ff40a0d3a647a84e1bb1228eb36.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
60d897552b97f3674000a6251cf3eea86cf37ff40a0d3a647a84e1bb1228eb36.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
60d897552b97f3674000a6251cf3eea86cf37ff40a0d3a647a84e1bb1228eb36.apk
-
Size
4.5MB
-
MD5
97f14823391ad297d0dfefd6dea3a594
-
SHA1
3d5295923a7dad2ce656192e96085ad230d24992
-
SHA256
60d897552b97f3674000a6251cf3eea86cf37ff40a0d3a647a84e1bb1228eb36
-
SHA512
122b13fe6e1ecdc8c674013435bfd3874be151fb651a4009e5d8e8e30e673075518eeb62ec521a2a6fa108a25109616b02fbc6735c086f567b7dfb00405f791d
-
SSDEEP
98304:qpmvfdSo6MFilhnZMN20pJMaPVVyf8NIhnVYE6NMRL3Ne+LmUKNa:qpufeMFWZMN2Jaef8NMVeMRL9HmUK4
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/fjucibysul.uqanrqredeyauczymgysadtadn.ame/app_DynamicOptDex/WhNHNd.json 4948 fjucibysul.uqanrqredeyauczymgysadtadn.ame /data/user/0/fjucibysul.uqanrqredeyauczymgysadtadn.ame/app_DynamicOptDex/WhNHNd.json 4948 fjucibysul.uqanrqredeyauczymgysadtadn.ame -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId fjucibysul.uqanrqredeyauczymgysadtadn.ame Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId fjucibysul.uqanrqredeyauczymgysadtadn.ame -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo fjucibysul.uqanrqredeyauczymgysadtadn.ame -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone fjucibysul.uqanrqredeyauczymgysadtadn.ame -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver fjucibysul.uqanrqredeyauczymgysadtadn.ame
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD50d860a45f18c86ee3f280f38bd3b1240
SHA1d5de2d96c2cd1fb1ba34661d3d4293ddbcc23454
SHA256f09e9e88210fa56bcd8419fb83a41b06e982d379760c3eac04a149e532166f88
SHA512281eb3cdd3ba6ba35b6169e0fbd7808b3ab7f8a83d26e4a7efef0af1b292f7022026b81c2d711a1a003354f447c2f4a83ae8aadbf87d0425a1605ea80d5c431f
-
Filesize
2.6MB
MD5d08fcb5b69fc7943e2d5edec4b89a540
SHA1f14ad38a138932b1e2069de20db1f3c98a85035a
SHA256648a65588f8f385d3fc735fdf87bf3b6f2c7999e4dafef7a32c420bf009c18c2
SHA512731c0a0580e4424e3b5d2c6fe674d70a62dbb985800ce6c910bef010f9450c9269129334ec5235f882f466da063954ceea3d7fb1e81f7a66beb9d0c3c84e38f5
-
Filesize
1KB
MD50a028b68c7924651defdadb7a1d1d8b0
SHA1bdbc130cc52a5f290a363019e80a8efd9fb137fa
SHA25691e5a1585157d06f4e39f23ba605a7a1541690f9f74de78b8823c305c3e80668
SHA5129faae124c66feb736b4e537a89d18ef7f56c95bdaed97e71b192c017e95353b44096a948898a149723461e7fe4aea9177b9a10253f8ecb17ec91857c7f231862