Analysis

  • max time kernel
    147s
  • max time network
    162s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    05-10-2024 22:04

General

  • Target

    37616211278f91dcdd1eff37f0676b1b8f0e3ae0e916be09283ce04548879951.apk

  • Size

    3.7MB

  • MD5

    6167f6870bcd7544b54802ad64613730

  • SHA1

    ed8f07fa36dfeda7b271693fa3c8ef7b3a34641c

  • SHA256

    37616211278f91dcdd1eff37f0676b1b8f0e3ae0e916be09283ce04548879951

  • SHA512

    5364258978d4ab271bf6e1a1a1e24ebba84f25bfb7bed3b179f2a384011776cdf5e878c56886c89cf25295bf4c84f51e0d433f1b29b68772c18e0d6a8af8b08d

  • SSDEEP

    98304:OJv+JOGJ5TjbsokQMNOSE3+D4yIn0oFxHxcPiPBr:OJGOGJ5TjbvfcEX0aHBr

Malware Config

Extracted

Family

hydra

C2

http://cangerconger.com

DES_key

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Reads the contacts stored on the device. 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs

Processes

  • com.bzmeccmlr.ijkljwevo
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Reads the contacts stored on the device.
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    PID:4629

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.bzmeccmlr.ijkljwevo/app_apk/payload.apk

    Filesize

    974KB

    MD5

    3baeaa766ea7f31a9147208efd957c75

    SHA1

    c701de3d0e55425394ccbf8e0967639e86f3c54e

    SHA256

    75e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d

    SHA512

    9f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f

  • /data/data/com.bzmeccmlr.ijkljwevo/app_dex/classes.dex

    Filesize

    2.7MB

    MD5

    f66e1b51ba075b67fc91fef97332d2e4

    SHA1

    6cdd7fb13563ba87e31a998fb292fdf107ea753b

    SHA256

    e7f6567f59dafe35595fa6f0ec99eb7102a36b5f4c761e06a4d56cea802e4424

    SHA512

    ae624d86a0e0d1ae80c19964b84074707aca730775c80d6f06e62e1bd3cb12210a94d5fb197e8461ce68d94a35409fe0ebb0774feeafdab0581d57bf7d235a31

  • /data/data/com.bzmeccmlr.ijkljwevo/cache/K03TVPnWNdU4BngpfSY8XTJwClLEuuKeLX8fTdoQ.zip

    Filesize

    67.8MB

    MD5

    16dfa83046f2bd93f658e8841a8db0be

    SHA1

    2c26e075bea87f8a622562d9bd6f391de69d1847

    SHA256

    26c9b8dc2b3c0daf3ba973dd80256e1f7289791561cb73192a7e7340810cad2c

    SHA512

    5e8bb0caf40a060a053865e8600313851083ab7ec8f5100626f22e828fc067a51c40db17c2038736f9e88011c892fc6424f5cb7f4328c3fc07b67b8288e5ffd7

  • /data/data/com.bzmeccmlr.ijkljwevo/cache/classes.dex

    Filesize

    1.3MB

    MD5

    39f81169125a260aa65b4b6ce95b88ca

    SHA1

    ecd67f5524bc16b70686c9e8e0b735e8d74bcc37

    SHA256

    4663eb1d510787c2e978e9e7faa316d34d79cccb0698336b0436b9d4109f4f4b

    SHA512

    77f2a3624cd732bfa935740591e96dc51120056876ada99d12328aafcdcbebd29379a3193d7ce6898ccefbf558f1b5f7772290bb8b78e236390bda5389de632c

  • /data/data/com.bzmeccmlr.ijkljwevo/cache/classes.zip

    Filesize

    1.3MB

    MD5

    3d24a62a7436272ae6fdc5d28d051377

    SHA1

    f8eecd5d893e5fdc8130c16da3310900812eeafb

    SHA256

    ce39f0c6b364d3dcb49c790d073902543a51da8f810dddab5bb21d9fe04f2a93

    SHA512

    891921d469ab03bf81e93851caf6215938cfc93e81b574afed944883633aaa421210819004db4b22627c9b257d8975e61f1981a44b07d95d93065062c567fb52