Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    16-10-2024 22:47

General

  • Target

    cc09dcbc69b65dd23e3ed36f94a12e29c7cae4ba339bf03e369d08451afc0de9.apk

  • Size

    4.9MB

  • MD5

    4855f5f03f9c9828cad5007cf349da0f

  • SHA1

    d786d851b29499776f2f78d58a0c7c68d3e6f4f8

  • SHA256

    cc09dcbc69b65dd23e3ed36f94a12e29c7cae4ba339bf03e369d08451afc0de9

  • SHA512

    bfa4d4539090c880641003035a23b083f7534cca4634971160aaee478418804745f8bb3636aa983c212da41f68dfc8d31a0ee60e65c21939d3a4048b07e4eedb

  • SSDEEP

    98304:eHf/eeOfT/z0el57b+mWFvXBvXohXzeh919krqQPU/0Oeiv/6Ojp:eHnefTQ857ims5PohXzItLCo0Ojv/6Od

Malware Config

Extracted

Family

hydra

C2

http://asdsa5d25sad24sad24asd.xyz

DES_key

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Reads the contacts stored on the device. 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs

Processes

  • com.swsoxbrms.qzfccspmi
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Reads the contacts stored on the device.
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    PID:4464

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.swsoxbrms.qzfccspmi/app_dex/classes.dex

    Filesize

    2.7MB

    MD5

    a73b3f42a4b6850a49ffdfdfea943954

    SHA1

    75d0b4920125fedfad482195a3a828a9e39bc40f

    SHA256

    91c37461f84b7046cfa0e50053216a32373b251502f858ba3a42a509fd7c60db

    SHA512

    ab37d6a7659644919d715d13041a58e5f6db45e4c0351765c44e2436cca1dbeac93908a85d7e7288437c92a671b3d85d77f30e1fb69c242f044f0f68f167cba1

  • /data/data/com.swsoxbrms.qzfccspmi/cache/classes.dex

    Filesize

    1.3MB

    MD5

    c1a22fae2bf8aaffa3f6de92dd9c8f08

    SHA1

    a4cc798eba36e27732cb87bd9e4934794eae7506

    SHA256

    b32fd3d21ca761e006d4821cba271aa2bb3b884f39b8eb442bcb4d6d207dc9d2

    SHA512

    029d225e657c1a118a3183dcbf0c27b8a36f6a9f03b44fd2fa3745d1fb7369d661f397d6b22c87e8b6080706a0c6337229558e5fd503383dd9e7eb9984e14a37

  • /data/data/com.swsoxbrms.qzfccspmi/cache/classes.zip

    Filesize

    1.3MB

    MD5

    3ab80ea147f93f654f36181a6952a1d2

    SHA1

    c68fe96ff450b87dcffd480a7143830674e2466c

    SHA256

    8aa3a2bb07b11d3173f13a14e65856df8714d5d62348766b21131e4dd6d515de

    SHA512

    c3163c2e27f073821f73c7a67349a43d285fb8d548fd64f2be6fc5bfd326f575d77eef6fa4b3cccdacc23f523274533f4323d8b54e6b6825e89f60d18609c029