General

  • Target

    1703cead32c403f68cd1d581191ae37dc641c185ee5b9eaf43575a79dc78f6bd.bin

  • Size

    4.2MB

  • Sample

    241015-1zkqesterm

  • MD5

    946cca782366bd08ac773dddd09f46c8

  • SHA1

    c4444446759a7690bd27c5965e9b138bcbd722a3

  • SHA256

    1703cead32c403f68cd1d581191ae37dc641c185ee5b9eaf43575a79dc78f6bd

  • SHA512

    5a4ff26eb60a8aa5af18335c2cd6b2236a8b5bedf60e830be4caddff6ab9a7b86b8b4a25f7e1fc071c0f33bd7cca728c2d708aa41f0b812fb9becf0abd0cf240

  • SSDEEP

    98304:KjPPICrol7hXOPlmxn6aCCqlhS1rENeI1ue0N9d:mPw1l7h+PlDaCCqlhS1rEMz/d

Malware Config

Extracted

Family

hydra

C2

http://hg24g23jh4g2j3h4g5jh235vb3.xyz

DES_key

Targets

    • Target

      1703cead32c403f68cd1d581191ae37dc641c185ee5b9eaf43575a79dc78f6bd.bin

    • Size

      4.2MB

    • MD5

      946cca782366bd08ac773dddd09f46c8

    • SHA1

      c4444446759a7690bd27c5965e9b138bcbd722a3

    • SHA256

      1703cead32c403f68cd1d581191ae37dc641c185ee5b9eaf43575a79dc78f6bd

    • SHA512

      5a4ff26eb60a8aa5af18335c2cd6b2236a8b5bedf60e830be4caddff6ab9a7b86b8b4a25f7e1fc071c0f33bd7cca728c2d708aa41f0b812fb9becf0abd0cf240

    • SSDEEP

      98304:KjPPICrol7hXOPlmxn6aCCqlhS1rENeI1ue0N9d:mPw1l7h+PlDaCCqlhS1rEMz/d

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Reads the contacts stored on the device.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks