General

  • Target

    74aab8e0ae7d32e93b13a006fdd9cf745215ed6dbf72c7599653bfed69369efb.bin

  • Size

    1.4MB

  • Sample

    241006-11dy9ssemh

  • MD5

    173149ab145e6fc348764312695eae99

  • SHA1

    204ddb9a89368539db3d65dbff13cd4c92e34fe0

  • SHA256

    74aab8e0ae7d32e93b13a006fdd9cf745215ed6dbf72c7599653bfed69369efb

  • SHA512

    493dc60347de545df79de27596a3e3e7667f793fa2dea68d2969c0e082cc279e97baf8a2578713c35f5c545ebb01c71e45a4541e885e65a31fdea3d7349a0c43

  • SSDEEP

    24576:OgVnyEJ6PR94Z4/JecuIi8nhBCCI3vYOh2lv4TdFGHAN:OgVnHARGZTcRi8n/6wO7TbH

Malware Config

Extracted

Family

hydra

C2

http://vadafoneszos.com

Targets

    • Target

      74aab8e0ae7d32e93b13a006fdd9cf745215ed6dbf72c7599653bfed69369efb.bin

    • Size

      1.4MB

    • MD5

      173149ab145e6fc348764312695eae99

    • SHA1

      204ddb9a89368539db3d65dbff13cd4c92e34fe0

    • SHA256

      74aab8e0ae7d32e93b13a006fdd9cf745215ed6dbf72c7599653bfed69369efb

    • SHA512

      493dc60347de545df79de27596a3e3e7667f793fa2dea68d2969c0e082cc279e97baf8a2578713c35f5c545ebb01c71e45a4541e885e65a31fdea3d7349a0c43

    • SSDEEP

      24576:OgVnyEJ6PR94Z4/JecuIi8nhBCCI3vYOh2lv4TdFGHAN:OgVnHARGZTcRi8n/6wO7TbH

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads the contacts stored on the device.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks