General

  • Target

    5f20ab1ec7eaf0f74c79e51f38e0cf2319ae5b76cd14707e16b2f2f0b1e3b371.bin

  • Size

    1.4MB

  • Sample

    241007-11gp6avhnn

  • MD5

    7f855ff481d348d7ed737ea2fbce0236

  • SHA1

    059ed65418e307206557aa083787c57a6c8537ff

  • SHA256

    5f20ab1ec7eaf0f74c79e51f38e0cf2319ae5b76cd14707e16b2f2f0b1e3b371

  • SHA512

    9ccaac35153b719d889119b3917ed6d2881174599ef4472fdebb5021db68b4b2e9956b330e08cf1f151b37a52ffaba881fb508fa1e55da28c5724db3812e64ee

  • SSDEEP

    24576:xgVnwx86bRZ4ZJaER47HTRPZ+YTnyN+/iL0z4csK3mPuISugmZHKXsdx0:xgVnj8R6ZJdRmdP0g6L0zzmP5SlmZrdi

Malware Config

Extracted

Family

hydra

C2

http://tayhodcayhodvanmez.com

Targets

    • Target

      5f20ab1ec7eaf0f74c79e51f38e0cf2319ae5b76cd14707e16b2f2f0b1e3b371.bin

    • Size

      1.4MB

    • MD5

      7f855ff481d348d7ed737ea2fbce0236

    • SHA1

      059ed65418e307206557aa083787c57a6c8537ff

    • SHA256

      5f20ab1ec7eaf0f74c79e51f38e0cf2319ae5b76cd14707e16b2f2f0b1e3b371

    • SHA512

      9ccaac35153b719d889119b3917ed6d2881174599ef4472fdebb5021db68b4b2e9956b330e08cf1f151b37a52ffaba881fb508fa1e55da28c5724db3812e64ee

    • SSDEEP

      24576:xgVnwx86bRZ4ZJaER47HTRPZ+YTnyN+/iL0z4csK3mPuISugmZHKXsdx0:xgVnj8R6ZJdRmdP0g6L0zzmP5SlmZrdi

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads the contacts stored on the device.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks