General
-
Target
931db39c57d99bca1248bea9a5464cf99939a223948e5f6d0e1797f55559f9d5.bin
-
Size
1.8MB
-
Sample
241009-1ycneszarg
-
MD5
6c4ec1458f53b6617f14d97ac8bfcd5d
-
SHA1
053d5419544074db3142facf22a72241f3f9976f
-
SHA256
931db39c57d99bca1248bea9a5464cf99939a223948e5f6d0e1797f55559f9d5
-
SHA512
b4141861e7e848c83325422e151042ef74b410df985135b840c0aedc4e8a35f38c2ca4133c4aa1701cd02274fdb944f95cebe199876c6fa6f76351b827a27e32
-
SSDEEP
49152:+8dtL8arLEztapFZMhFwYtIgumC3qaiWrLW92ZkbWVXFFEjO:3+MEJwHNt3qnkW9akbWVXEjO
Static task
static1
Behavioral task
behavioral1
Sample
931db39c57d99bca1248bea9a5464cf99939a223948e5f6d0e1797f55559f9d5.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
931db39c57d99bca1248bea9a5464cf99939a223948e5f6d0e1797f55559f9d5.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
931db39c57d99bca1248bea9a5464cf99939a223948e5f6d0e1797f55559f9d5.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
hydra
http://yolderyasibizdenizgez.net
Targets
-
-
Target
931db39c57d99bca1248bea9a5464cf99939a223948e5f6d0e1797f55559f9d5.bin
-
Size
1.8MB
-
MD5
6c4ec1458f53b6617f14d97ac8bfcd5d
-
SHA1
053d5419544074db3142facf22a72241f3f9976f
-
SHA256
931db39c57d99bca1248bea9a5464cf99939a223948e5f6d0e1797f55559f9d5
-
SHA512
b4141861e7e848c83325422e151042ef74b410df985135b840c0aedc4e8a35f38c2ca4133c4aa1701cd02274fdb944f95cebe199876c6fa6f76351b827a27e32
-
SSDEEP
49152:+8dtL8arLEztapFZMhFwYtIgumC3qaiWrLW92ZkbWVXFFEjO:3+MEJwHNt3qnkW9akbWVXEjO
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Reads the contacts stored on the device.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1