General
-
Target
VIRUSS (1).apk
-
Size
3.9MB
-
Sample
240810-n1sq7sxhnj
-
MD5
390fd73da69bf2ab9c6482e1021b5fcc
-
SHA1
97d64248009a2c7ff2b14329177af40b99365096
-
SHA256
806d430ab6c6d78d26061a2d837e8236a45994acd43d6e623495391dd8bc0df8
-
SHA512
34fb32899bf78512c4d05538963eed2b2a6a742211bf0a3ff2c8faf946f543499de8e14b457fe00953ebde69d73f286ee2a44c7f0187f7ef89cc53e006347e97
-
SSDEEP
98304:9xQVlf5YcCWEjgQxJNEKVPl+1SPuCHienhIg15bd6gNxEMHszD0X9:DQVxG9RBV93rCafkIsz+9
Static task
static1
Behavioral task
behavioral1
Sample
VIRUSS (1).apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
hydra
http://91.215.85.182
Targets
-
-
Target
VIRUSS (1).apk
-
Size
3.9MB
-
MD5
390fd73da69bf2ab9c6482e1021b5fcc
-
SHA1
97d64248009a2c7ff2b14329177af40b99365096
-
SHA256
806d430ab6c6d78d26061a2d837e8236a45994acd43d6e623495391dd8bc0df8
-
SHA512
34fb32899bf78512c4d05538963eed2b2a6a742211bf0a3ff2c8faf946f543499de8e14b457fe00953ebde69d73f286ee2a44c7f0187f7ef89cc53e006347e97
-
SSDEEP
98304:9xQVlf5YcCWEjgQxJNEKVPl+1SPuCHienhIg15bd6gNxEMHszD0X9:DQVxG9RBV93rCafkIsz+9
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Reads the contacts stored on the device.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1