General

  • Target

    00e927d7c70d6b93f88117e9c5f921a1c81f04291c7b89fe6522000fab554108.bin

  • Size

    1.4MB

  • Sample

    241007-1yl7vsvgrm

  • MD5

    910b74888c7a20f0748cafdfa9fe41ae

  • SHA1

    50a1b69c32c32847e37c6d664c213cb1aaff2483

  • SHA256

    00e927d7c70d6b93f88117e9c5f921a1c81f04291c7b89fe6522000fab554108

  • SHA512

    006238fb1aba531a55ac64369c5b394b867896f8835e344d470295ffdbf65e875581aa5db0efeb2313ee66e44f31f2ebe3665b67eb04b073a1aec1177408a81f

  • SSDEEP

    24576:WgVnneJ6vBZZZJaER47HTRPZ+YTnyN+/iL0z4csK3mPuISugmZHKXsdxI:WgVn6YBbZJdRmdP0g6L0zzmP5SlmZrdG

Malware Config

Extracted

Family

hydra

C2

http://tayhodcayhodvanmez.com

Targets

    • Target

      00e927d7c70d6b93f88117e9c5f921a1c81f04291c7b89fe6522000fab554108.bin

    • Size

      1.4MB

    • MD5

      910b74888c7a20f0748cafdfa9fe41ae

    • SHA1

      50a1b69c32c32847e37c6d664c213cb1aaff2483

    • SHA256

      00e927d7c70d6b93f88117e9c5f921a1c81f04291c7b89fe6522000fab554108

    • SHA512

      006238fb1aba531a55ac64369c5b394b867896f8835e344d470295ffdbf65e875581aa5db0efeb2313ee66e44f31f2ebe3665b67eb04b073a1aec1177408a81f

    • SSDEEP

      24576:WgVnneJ6vBZZZJaER47HTRPZ+YTnyN+/iL0z4csK3mPuISugmZHKXsdxI:WgVn6YBbZJdRmdP0g6L0zzmP5SlmZrdG

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads the contacts stored on the device.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks