Analysis
-
max time kernel
148s -
max time network
161s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
11-10-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990.apk
-
Size
4.9MB
-
MD5
c9db7b7c68e3f4b3ea7bc6d2db7e6c67
-
SHA1
21f29a3bdafe66b9d9a4a0900f87ae0378c2af4e
-
SHA256
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990
-
SHA512
d1b4e39dc0b7d39465d64f3fb774fbfe8442ff66d52f2380cf550d2e82838cda33e5dbd6d4a443db964746da309ce3add0d9db884adb2848028f641cd65cbe11
-
SSDEEP
98304:Ftpb68BpwSSih42NbdUGDIJ9wWATD6V7sq/2wsA2OC6OKQv:75TBgih4IbDIXwWk6VYi2dP
Malware Config
Extracted
hydra
http://cabmeldtpgabrilokez.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
Processes:
resource yara_rule /data/data/com.vpdmkbfdr.hclrvjtqr/app_dex/classes.dex family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.vpdmkbfdr.hclrvjtqrioc pid process /data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/classes.dex 4950 com.vpdmkbfdr.hclrvjtqr /data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/classes.dex 4950 com.vpdmkbfdr.hclrvjtqr -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.vpdmkbfdr.hclrvjtqrdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.vpdmkbfdr.hclrvjtqr Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.vpdmkbfdr.hclrvjtqr -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
Processes:
com.vpdmkbfdr.hclrvjtqrdescription ioc process URI accessed for read content://com.android.contacts/contacts com.vpdmkbfdr.hclrvjtqr -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.vpdmkbfdr.hclrvjtqrdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.vpdmkbfdr.hclrvjtqr -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.vpdmkbfdr.hclrvjtqrioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.vpdmkbfdr.hclrvjtqr -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.vpdmkbfdr.hclrvjtqrdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.vpdmkbfdr.hclrvjtqr -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.vpdmkbfdr.hclrvjtqrdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.vpdmkbfdr.hclrvjtqr -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.vpdmkbfdr.hclrvjtqrdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.vpdmkbfdr.hclrvjtqr
Processes
-
com.vpdmkbfdr.hclrvjtqr1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4950
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
974KB
MD53baeaa766ea7f31a9147208efd957c75
SHA1c701de3d0e55425394ccbf8e0967639e86f3c54e
SHA25675e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d
SHA5129f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f
-
Filesize
2.7MB
MD59fcebe6ac01f9abcb9358ef3e1be01f8
SHA10c99f46ce1bfa1cfa76a0e30d27c822029db1659
SHA256ab056d7cd8db1977da982d9a2dd8258015120e3cb3ced1abf105ca6e36d724b9
SHA512192c075908f5c18acec27d8b7dd62220727213309764eca391c2d4b558b34cb76eae09ad8aacefe9d9ac46603fe220e685d55e587260881c0247fe6def6ef8c3
-
Filesize
1.3MB
MD5198e249fc4cb7eebfb3aa41c9bca936b
SHA162739a33b597f5f817868c31d76189c34f2a8ce9
SHA2568ff952de0092bbdbd15695e7c6f9b5137015c71f0762edc89417f4cc9d67108a
SHA512cc1b1d9fc44daacb892900b2b17b93db8cb4880e705530d3aeb444b3c7fcda6a4a59266a4c5d56266942b0568bc09ae08f7572c74f8272a3030d210c4b36b6f8
-
Filesize
1.3MB
MD5fdae72c7dd1658f5582bb244648dcc72
SHA156eb6eb1252e0dc7eda9784c49b81e0a00f6d920
SHA256831d26600070e587aca3567bae1a092e77808aecdb6c3ada2d6e3a00d2dd04a1
SHA5125cef1ab17b14497b6a7f4beb1cd8fb424c7962b845597bc833395c49bc79b32d4fd49b862767dab29efdc660ae39e1a99f5b8e1157e1430ae5d312ebb20ca95e
-
Filesize
4.6MB
MD567ff4f754f9dfad17e68336f56b99dec
SHA1e4bfbd08ddf3b6516732e96df0f7a69d79db9151
SHA25675b8bb8ee861ec5ce74d5b54cda4a94895d954e2de373d951f9e840648731087
SHA5124d96532c1132565675593aaa413aa8be71555fa99e9ba5a32fd881e576282cd043d4645af1a091dae2c904a51599ecbba15d34d76126383551d5873ce132b717
-
Filesize
9.0MB
MD51bc306b01015168a50b725cc12795ced
SHA11fcf45bd760ef1cf94e6bae6a50703723433b3cd
SHA256e1bdb85cd40fe1cb404985c836ea59eb7ec800ba4af4fda2b7fc239030bcb41b
SHA512da83c6e27ba5944e4eed0c99fcc93cf5d7aa7c443472072b1a8b757290958b46265f9da501ef75072be0dc80baecd4c1e7397e892bff4aea55fec8883967388d