Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    15-10-2024 22:02

General

  • Target

    5a35d1750b0aea8bb5e3d15a060b59d6917f62278c21fb4a2df1b7854b1caa71.apk

  • Size

    4.2MB

  • MD5

    81e176d7c1c6c0a0006d8e48e049b513

  • SHA1

    51a1c95841caa9151c3a83d9b0a48085213e8044

  • SHA256

    5a35d1750b0aea8bb5e3d15a060b59d6917f62278c21fb4a2df1b7854b1caa71

  • SHA512

    300290cc8fcad8d499657d7f04830eea47b18238335702b844e3f72cdbb622f8c4171ba982f587c0236bae05dcd0ee651348a23d12b0e58535f42c46f15bd5c7

  • SSDEEP

    98304:edthOuc+XEwAiYYuLLkAhdxyGv37Bdyk3U0At8RPB7Ct:ejY+XEwATsAgm3AcdCt

Malware Config

Extracted

Family

hydra

C2

http://aksd24j3232d32kd2j.xyz

DES_key

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Reads the contacts stored on the device. 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs

Processes

  • com.ipssqzaje.swwyjedec
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Reads the contacts stored on the device.
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    PID:5095

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.ipssqzaje.swwyjedec/app_dex/classes.dex

    Filesize

    2.7MB

    MD5

    87c1b42e3dae5687135a459667d76661

    SHA1

    a6df56f070c6fe69e8fedd227f9c3cb47eb0bccc

    SHA256

    10bcdd0529a5723c1e616c499d3bb6d8749772107c6ee595b564ec0ce717b941

    SHA512

    f1ee7ef61da813662f1adf96ad184f5c47fc96dae2b3c833af64c97d746ad8f3e969aedbcb3cb78cd6898b0eb40290150007264b7d230923ed2d0eb51ba069fa

  • /data/data/com.ipssqzaje.swwyjedec/cache/classes.dex

    Filesize

    1.3MB

    MD5

    a3152cf7b43dd245a8a70238c6d737f6

    SHA1

    b20317b978a177c7be22d04809acd11958932331

    SHA256

    598d4a459124682eb40cbfdbfc6c4a5003208ac5e0d772cbd114c25ca3e2c573

    SHA512

    765a72ec266d1e90214095dbdcb2480aaeb288ba9294da1ba0672846c77ac0909fd2656759ea60446e59f9209a51ac459e692ef6229a7c16677a5f84211d013d

  • /data/data/com.ipssqzaje.swwyjedec/cache/classes.zip

    Filesize

    1.3MB

    MD5

    6892e3128dc58016555e325eca1361e4

    SHA1

    3ee07286d7720fd94023a1185ad008d035e36b36

    SHA256

    1126d5d5637a9cdc01197605acfcbd25eea179662f08df78bc0142bd24b93b87

    SHA512

    6195e980d7d5df6bb0c26880e386680bbde0e6e5c0227fcc0b23cc73f45fcbd76bd27fd72073d311f5ee55758be7aa643f46195039c44f21fdc608b992c69a3d