Resubmissions

21-08-2024 07:26

240821-h9s6fazejm 10

24-06-2024 06:48

240624-hkrlbazbje 6

General

  • Target

    cnzjhttmkttakcgd.apk

  • Size

    4.4MB

  • Sample

    240821-h9s6fazejm

  • MD5

    5724cfd1f0c5edd71f3d451e5c02cf3c

  • SHA1

    2dfe37f73fc5174ed6b02c616c22ac1fd981aac8

  • SHA256

    83e5822562da08cbab888ba5af84aa118c298de4fdb39fde2ac3b36492816f52

  • SHA512

    389307ba8e7e0bccffea2d654f623732c9fd4b1da55567d899bb89a52766a13e8c117ec35f8ef3e634987442bc5896624b5b7279559258eef87180ef82134da0

  • SSDEEP

    98304:vM+grW9YmPdveu4nvULGfQ0A/DoGLiXJqIU0vt2:vM+gK9TCzfQ0A/MGiZqt0vt2

Malware Config

Extracted

Family

hydra

C2

http://safiresolimetopulezdomire.xyz

Targets

    • Target

      cnzjhttmkttakcgd.apk

    • Size

      4.4MB

    • MD5

      5724cfd1f0c5edd71f3d451e5c02cf3c

    • SHA1

      2dfe37f73fc5174ed6b02c616c22ac1fd981aac8

    • SHA256

      83e5822562da08cbab888ba5af84aa118c298de4fdb39fde2ac3b36492816f52

    • SHA512

      389307ba8e7e0bccffea2d654f623732c9fd4b1da55567d899bb89a52766a13e8c117ec35f8ef3e634987442bc5896624b5b7279559258eef87180ef82134da0

    • SSDEEP

      98304:vM+grW9YmPdveu4nvULGfQ0A/DoGLiXJqIU0vt2:vM+gK9TCzfQ0A/MGiZqt0vt2

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Reads the contacts stored on the device.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks