Analysis
-
max time kernel
149s -
max time network
160s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
11-10-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990.apk
-
Size
4.9MB
-
MD5
c9db7b7c68e3f4b3ea7bc6d2db7e6c67
-
SHA1
21f29a3bdafe66b9d9a4a0900f87ae0378c2af4e
-
SHA256
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990
-
SHA512
d1b4e39dc0b7d39465d64f3fb774fbfe8442ff66d52f2380cf550d2e82838cda33e5dbd6d4a443db964746da309ce3add0d9db884adb2848028f641cd65cbe11
-
SSDEEP
98304:Ftpb68BpwSSih42NbdUGDIJ9wWATD6V7sq/2wsA2OC6OKQv:75TBgih4IbDIXwWk6VYi2dP
Malware Config
Extracted
hydra
http://cabmeldtpgabrilokez.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/fstream-3.dat family_hydra2 behavioral1/memory/4248-1.dex family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.vpdmkbfdr.hclrvjtqr/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&ioc pid Process /data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/classes.dex 4248 com.vpdmkbfdr.hclrvjtqr /data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/classes.dex 4278 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/classes.dex 4248 com.vpdmkbfdr.hclrvjtqr -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.vpdmkbfdr.hclrvjtqrdescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.vpdmkbfdr.hclrvjtqr Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.vpdmkbfdr.hclrvjtqr -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
Processes:
com.vpdmkbfdr.hclrvjtqrdescription ioc Process URI accessed for read content://com.android.contacts/contacts com.vpdmkbfdr.hclrvjtqr -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.vpdmkbfdr.hclrvjtqrdescription ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.vpdmkbfdr.hclrvjtqr -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.vpdmkbfdr.hclrvjtqrioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.vpdmkbfdr.hclrvjtqr -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.vpdmkbfdr.hclrvjtqrdescription ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.vpdmkbfdr.hclrvjtqr -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.vpdmkbfdr.hclrvjtqrdescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.vpdmkbfdr.hclrvjtqr -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.vpdmkbfdr.hclrvjtqrdescription ioc Process Framework service call android.app.IActivityManager.registerReceiver com.vpdmkbfdr.hclrvjtqr
Processes
-
com.vpdmkbfdr.hclrvjtqr1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4248 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4278
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
974KB
MD53baeaa766ea7f31a9147208efd957c75
SHA1c701de3d0e55425394ccbf8e0967639e86f3c54e
SHA25675e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d
SHA5129f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f
-
Filesize
2.7MB
MD59fcebe6ac01f9abcb9358ef3e1be01f8
SHA10c99f46ce1bfa1cfa76a0e30d27c822029db1659
SHA256ab056d7cd8db1977da982d9a2dd8258015120e3cb3ced1abf105ca6e36d724b9
SHA512192c075908f5c18acec27d8b7dd62220727213309764eca391c2d4b558b34cb76eae09ad8aacefe9d9ac46603fe220e685d55e587260881c0247fe6def6ef8c3
-
Filesize
1.3MB
MD5198e249fc4cb7eebfb3aa41c9bca936b
SHA162739a33b597f5f817868c31d76189c34f2a8ce9
SHA2568ff952de0092bbdbd15695e7c6f9b5137015c71f0762edc89417f4cc9d67108a
SHA512cc1b1d9fc44daacb892900b2b17b93db8cb4880e705530d3aeb444b3c7fcda6a4a59266a4c5d56266942b0568bc09ae08f7572c74f8272a3030d210c4b36b6f8
-
Filesize
1.3MB
MD5fdae72c7dd1658f5582bb244648dcc72
SHA156eb6eb1252e0dc7eda9784c49b81e0a00f6d920
SHA256831d26600070e587aca3567bae1a092e77808aecdb6c3ada2d6e3a00d2dd04a1
SHA5125cef1ab17b14497b6a7f4beb1cd8fb424c7962b845597bc833395c49bc79b32d4fd49b862767dab29efdc660ae39e1a99f5b8e1157e1430ae5d312ebb20ca95e
-
Filesize
15.8MB
MD56b4f81a7b181169581073838b7b87709
SHA151a51c3544f24e6c34ab380932a31263c74cf1e0
SHA256ebec59b1698e9723b8a1d3788e385fa82107d7e3b2be88a2b2d06e6a91e66942
SHA5120058d973c54b203a95a8d3cd4b91de7c6dcdd94c01ed6271ec6b614b021db24f8c84326a2f12f73033bd5441aa1626efd8dce390ea7b9a6ef7efb8079efd0a96
-
Filesize
2.0MB
MD59b10bdf84996c9edcf3b16042cc1fc5f
SHA1e1ce5cc641816d9732030f677444232fe298543f
SHA256a6eedb39c889127166cce116b047e49803431dce9822cf86b874cd3952f1e1c2
SHA51294e6a54585fde6146538cde3dabfb1942045a3264e6ee59bc87dd5101a022f9a90823fcba757fbf7a3973905a5f2acf9463c3e048907d8fec216ba9d9df846ad
-
Filesize
2.7MB
MD58d90b856e648ae046910a729444c6cd9
SHA1593447bc893698a35223865bf9268249a2d91494
SHA256c1fe39803df5d3d049fa284e81391cd3e6439f796da7d1d7528b54889e8eb5b5
SHA512cbf78421424c442a88726be1a5691ed482ad5f4841156d6b2986399c709d3d7e35a252662273b239db3d7940c4dbe479a29e02c2c3d6af127b98e556759ab963