General
-
Target
676252be67035bf42b740041865d8a902988eb32111bcf9995e5ae774c420930.bin
-
Size
4.7MB
-
Sample
240808-1xerdsvapa
-
MD5
9fc0aa2fac6d9f36c2bc26cfec8278ce
-
SHA1
f768666ee5f2c8a197bbc95a0b8a674d919c7c08
-
SHA256
676252be67035bf42b740041865d8a902988eb32111bcf9995e5ae774c420930
-
SHA512
6ade9d6c32caaa03449e973b9f7e934c07b1ca84e48469cf379abfa81dcf0699b4fcf3e2f85022cd5324d256682edb0d17a768bc8f05562836a8d57588b50c15
-
SSDEEP
98304:DEJefbQL79Az8VCvGvPEhnzKIrzj5LFnGmu3FOT:D1f4hLVCPzKIrzJu1c
Static task
static1
Behavioral task
behavioral1
Sample
676252be67035bf42b740041865d8a902988eb32111bcf9995e5ae774c420930.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
676252be67035bf42b740041865d8a902988eb32111bcf9995e5ae774c420930.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
676252be67035bf42b740041865d8a902988eb32111bcf9995e5ae774c420930.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
hydra
https://gist.githubusercontent.com/olimpiamilano200/65c0969b6dc440233852de072ac97545/raw/helloworld.json
Targets
-
-
Target
676252be67035bf42b740041865d8a902988eb32111bcf9995e5ae774c420930.bin
-
Size
4.7MB
-
MD5
9fc0aa2fac6d9f36c2bc26cfec8278ce
-
SHA1
f768666ee5f2c8a197bbc95a0b8a674d919c7c08
-
SHA256
676252be67035bf42b740041865d8a902988eb32111bcf9995e5ae774c420930
-
SHA512
6ade9d6c32caaa03449e973b9f7e934c07b1ca84e48469cf379abfa81dcf0699b4fcf3e2f85022cd5324d256682edb0d17a768bc8f05562836a8d57588b50c15
-
SSDEEP
98304:DEJefbQL79Az8VCvGvPEhnzKIrzj5LFnGmu3FOT:D1f4hLVCPzKIrzJu1c
-
Hydra family
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-