General

  • Target

    64e1823d615290a9928071ca28cef39e066a6c0acd99c4d256986a78c630f2cd.bin

  • Size

    4.2MB

  • Sample

    240809-18bh4ssbql

  • MD5

    977e63b35eabcc202fa7407763517ab0

  • SHA1

    dc327a30574186e2275587b0089d46e06d81a51f

  • SHA256

    64e1823d615290a9928071ca28cef39e066a6c0acd99c4d256986a78c630f2cd

  • SHA512

    6b66cb22ad5dbdc5e0beae65944eadd1a9628d45d84fddad06c0573079700b5d4f97703b5c71858485cc81d4ea9094f4744ff8fca613b6f1b8699ec3a41be9cd

  • SSDEEP

    98304:4ZbhYxPXwoOo1Ugi+vb0EqTHikIovs4W4vjYluiP07LT3ToSFHB:YbSR7Oo1ACgEqTHwnv4vr/7nESFHB

Malware Config

Extracted

Family

hydra

C2

http://ggfttffygygyf6544566.cfd

Targets

    • Target

      64e1823d615290a9928071ca28cef39e066a6c0acd99c4d256986a78c630f2cd.bin

    • Size

      4.2MB

    • MD5

      977e63b35eabcc202fa7407763517ab0

    • SHA1

      dc327a30574186e2275587b0089d46e06d81a51f

    • SHA256

      64e1823d615290a9928071ca28cef39e066a6c0acd99c4d256986a78c630f2cd

    • SHA512

      6b66cb22ad5dbdc5e0beae65944eadd1a9628d45d84fddad06c0573079700b5d4f97703b5c71858485cc81d4ea9094f4744ff8fca613b6f1b8699ec3a41be9cd

    • SSDEEP

      98304:4ZbhYxPXwoOo1Ugi+vb0EqTHikIovs4W4vjYluiP07LT3ToSFHB:YbSR7Oo1ACgEqTHwnv4vr/7nESFHB

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Reads the contacts stored on the device.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks