General
-
Target
cnzjhttmkttakcgd.apk
-
Size
4.4MB
-
Sample
240821-h9s6fazejm
-
MD5
5724cfd1f0c5edd71f3d451e5c02cf3c
-
SHA1
2dfe37f73fc5174ed6b02c616c22ac1fd981aac8
-
SHA256
83e5822562da08cbab888ba5af84aa118c298de4fdb39fde2ac3b36492816f52
-
SHA512
389307ba8e7e0bccffea2d654f623732c9fd4b1da55567d899bb89a52766a13e8c117ec35f8ef3e634987442bc5896624b5b7279559258eef87180ef82134da0
-
SSDEEP
98304:vM+grW9YmPdveu4nvULGfQ0A/DoGLiXJqIU0vt2:vM+gK9TCzfQ0A/MGiZqt0vt2
Static task
static1
Behavioral task
behavioral1
Sample
cnzjhttmkttakcgd.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
hydra
http://safiresolimetopulezdomire.xyz
Targets
-
-
Target
cnzjhttmkttakcgd.apk
-
Size
4.4MB
-
MD5
5724cfd1f0c5edd71f3d451e5c02cf3c
-
SHA1
2dfe37f73fc5174ed6b02c616c22ac1fd981aac8
-
SHA256
83e5822562da08cbab888ba5af84aa118c298de4fdb39fde2ac3b36492816f52
-
SHA512
389307ba8e7e0bccffea2d654f623732c9fd4b1da55567d899bb89a52766a13e8c117ec35f8ef3e634987442bc5896624b5b7279559258eef87180ef82134da0
-
SSDEEP
98304:vM+grW9YmPdveu4nvULGfQ0A/DoGLiXJqIU0vt2:vM+gK9TCzfQ0A/MGiZqt0vt2
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Reads the contacts stored on the device.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1