Analysis
-
max time kernel
148s -
max time network
155s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
16-10-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
cc09dcbc69b65dd23e3ed36f94a12e29c7cae4ba339bf03e369d08451afc0de9.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
cc09dcbc69b65dd23e3ed36f94a12e29c7cae4ba339bf03e369d08451afc0de9.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
cc09dcbc69b65dd23e3ed36f94a12e29c7cae4ba339bf03e369d08451afc0de9.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
cc09dcbc69b65dd23e3ed36f94a12e29c7cae4ba339bf03e369d08451afc0de9.apk
-
Size
4.9MB
-
MD5
4855f5f03f9c9828cad5007cf349da0f
-
SHA1
d786d851b29499776f2f78d58a0c7c68d3e6f4f8
-
SHA256
cc09dcbc69b65dd23e3ed36f94a12e29c7cae4ba339bf03e369d08451afc0de9
-
SHA512
bfa4d4539090c880641003035a23b083f7534cca4634971160aaee478418804745f8bb3636aa983c212da41f68dfc8d31a0ee60e65c21939d3a4048b07e4eedb
-
SSDEEP
98304:eHf/eeOfT/z0el57b+mWFvXBvXohXzeh919krqQPU/0Oeiv/6Ojp:eHnefTQ857ims5PohXzItLCo0Ojv/6Od
Malware Config
Extracted
hydra
http://asdsa5d25sad24sad24asd.xyz
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral3/files/fstream-3.dat family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.swsoxbrms.qzfccspmi/app_dex/classes.dex 4464 com.swsoxbrms.qzfccspmi /data/user/0/com.swsoxbrms.qzfccspmi/app_dex/classes.dex 4464 com.swsoxbrms.qzfccspmi -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.swsoxbrms.qzfccspmi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.swsoxbrms.qzfccspmi -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.swsoxbrms.qzfccspmi -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.swsoxbrms.qzfccspmi -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.swsoxbrms.qzfccspmi -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.swsoxbrms.qzfccspmi -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.swsoxbrms.qzfccspmi -
Reads information about phone network operator. 1 TTPs
Processes
-
com.swsoxbrms.qzfccspmi1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
PID:4464
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5a73b3f42a4b6850a49ffdfdfea943954
SHA175d0b4920125fedfad482195a3a828a9e39bc40f
SHA25691c37461f84b7046cfa0e50053216a32373b251502f858ba3a42a509fd7c60db
SHA512ab37d6a7659644919d715d13041a58e5f6db45e4c0351765c44e2436cca1dbeac93908a85d7e7288437c92a671b3d85d77f30e1fb69c242f044f0f68f167cba1
-
Filesize
1.3MB
MD5c1a22fae2bf8aaffa3f6de92dd9c8f08
SHA1a4cc798eba36e27732cb87bd9e4934794eae7506
SHA256b32fd3d21ca761e006d4821cba271aa2bb3b884f39b8eb442bcb4d6d207dc9d2
SHA512029d225e657c1a118a3183dcbf0c27b8a36f6a9f03b44fd2fa3745d1fb7369d661f397d6b22c87e8b6080706a0c6337229558e5fd503383dd9e7eb9984e14a37
-
Filesize
1.3MB
MD53ab80ea147f93f654f36181a6952a1d2
SHA1c68fe96ff450b87dcffd480a7143830674e2466c
SHA2568aa3a2bb07b11d3173f13a14e65856df8714d5d62348766b21131e4dd6d515de
SHA512c3163c2e27f073821f73c7a67349a43d285fb8d548fd64f2be6fc5bfd326f575d77eef6fa4b3cccdacc23f523274533f4323d8b54e6b6825e89f60d18609c029