General
-
Target
1703cead32c403f68cd1d581191ae37dc641c185ee5b9eaf43575a79dc78f6bd.bin
-
Size
4.2MB
-
Sample
241015-1zkqesterm
-
MD5
946cca782366bd08ac773dddd09f46c8
-
SHA1
c4444446759a7690bd27c5965e9b138bcbd722a3
-
SHA256
1703cead32c403f68cd1d581191ae37dc641c185ee5b9eaf43575a79dc78f6bd
-
SHA512
5a4ff26eb60a8aa5af18335c2cd6b2236a8b5bedf60e830be4caddff6ab9a7b86b8b4a25f7e1fc071c0f33bd7cca728c2d708aa41f0b812fb9becf0abd0cf240
-
SSDEEP
98304:KjPPICrol7hXOPlmxn6aCCqlhS1rENeI1ue0N9d:mPw1l7h+PlDaCCqlhS1rEMz/d
Static task
static1
Behavioral task
behavioral1
Sample
1703cead32c403f68cd1d581191ae37dc641c185ee5b9eaf43575a79dc78f6bd.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
1703cead32c403f68cd1d581191ae37dc641c185ee5b9eaf43575a79dc78f6bd.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
1703cead32c403f68cd1d581191ae37dc641c185ee5b9eaf43575a79dc78f6bd.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
hydra
http://hg24g23jh4g2j3h4g5jh235vb3.xyz
Targets
-
-
Target
1703cead32c403f68cd1d581191ae37dc641c185ee5b9eaf43575a79dc78f6bd.bin
-
Size
4.2MB
-
MD5
946cca782366bd08ac773dddd09f46c8
-
SHA1
c4444446759a7690bd27c5965e9b138bcbd722a3
-
SHA256
1703cead32c403f68cd1d581191ae37dc641c185ee5b9eaf43575a79dc78f6bd
-
SHA512
5a4ff26eb60a8aa5af18335c2cd6b2236a8b5bedf60e830be4caddff6ab9a7b86b8b4a25f7e1fc071c0f33bd7cca728c2d708aa41f0b812fb9becf0abd0cf240
-
SSDEEP
98304:KjPPICrol7hXOPlmxn6aCCqlhS1rENeI1ue0N9d:mPw1l7h+PlDaCCqlhS1rEMz/d
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Reads the contacts stored on the device.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1