General

  • Target

    676252be67035bf42b740041865d8a902988eb32111bcf9995e5ae774c420930.bin

  • Size

    4.7MB

  • Sample

    240808-1xerdsvapa

  • MD5

    9fc0aa2fac6d9f36c2bc26cfec8278ce

  • SHA1

    f768666ee5f2c8a197bbc95a0b8a674d919c7c08

  • SHA256

    676252be67035bf42b740041865d8a902988eb32111bcf9995e5ae774c420930

  • SHA512

    6ade9d6c32caaa03449e973b9f7e934c07b1ca84e48469cf379abfa81dcf0699b4fcf3e2f85022cd5324d256682edb0d17a768bc8f05562836a8d57588b50c15

  • SSDEEP

    98304:DEJefbQL79Az8VCvGvPEhnzKIrzj5LFnGmu3FOT:D1f4hLVCPzKIrzJu1c

Malware Config

Extracted

Family

hydra

C2

https://gist.githubusercontent.com/olimpiamilano200/65c0969b6dc440233852de072ac97545/raw/helloworld.json

Targets

    • Target

      676252be67035bf42b740041865d8a902988eb32111bcf9995e5ae774c420930.bin

    • Size

      4.7MB

    • MD5

      9fc0aa2fac6d9f36c2bc26cfec8278ce

    • SHA1

      f768666ee5f2c8a197bbc95a0b8a674d919c7c08

    • SHA256

      676252be67035bf42b740041865d8a902988eb32111bcf9995e5ae774c420930

    • SHA512

      6ade9d6c32caaa03449e973b9f7e934c07b1ca84e48469cf379abfa81dcf0699b4fcf3e2f85022cd5324d256682edb0d17a768bc8f05562836a8d57588b50c15

    • SSDEEP

      98304:DEJefbQL79Az8VCvGvPEhnzKIrzj5LFnGmu3FOT:D1f4hLVCPzKIrzJu1c

    • Hydra

      Android banker and info stealer.

    • Hydra family

    • Hydra payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks