General

  • Target

    04675e76830e6712a2003ab116aa291fe8e4215b4e7f6205545def6628d5ab0e.bin

  • Size

    3.7MB

  • Sample

    241008-1ynqpa1erm

  • MD5

    fba336a880413566c127941e1eb45337

  • SHA1

    3d9828dc84ef60fd87ccd74718434f1404ea0d61

  • SHA256

    04675e76830e6712a2003ab116aa291fe8e4215b4e7f6205545def6628d5ab0e

  • SHA512

    76b8cafbc4ef772d6d98df02500a1686d8d114efccf0ff443de44296b0a36ef859ac00ffe4c995fc5780a16af8c5e1b7579634d2c627fbd46a551809a3f4e3b0

  • SSDEEP

    49152:HY1HFqgiKrgW7rXipJSSduOt/F12vYYnAtKT64F5Eedvq1PDpMsHgoauRSqIsZNY:4HrHrX+ivYYnAtgt7/dvqX7HJ/S9sZNY

Malware Config

Extracted

Family

hydra

C2

http://yahyolkayhodses.com

DES_key

Targets

    • Target

      04675e76830e6712a2003ab116aa291fe8e4215b4e7f6205545def6628d5ab0e.bin

    • Size

      3.7MB

    • MD5

      fba336a880413566c127941e1eb45337

    • SHA1

      3d9828dc84ef60fd87ccd74718434f1404ea0d61

    • SHA256

      04675e76830e6712a2003ab116aa291fe8e4215b4e7f6205545def6628d5ab0e

    • SHA512

      76b8cafbc4ef772d6d98df02500a1686d8d114efccf0ff443de44296b0a36ef859ac00ffe4c995fc5780a16af8c5e1b7579634d2c627fbd46a551809a3f4e3b0

    • SSDEEP

      49152:HY1HFqgiKrgW7rXipJSSduOt/F12vYYnAtKT64F5Eedvq1PDpMsHgoauRSqIsZNY:4HrHrX+ivYYnAtgt7/dvqX7HJ/S9sZNY

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Reads the contacts stored on the device.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks