Analysis
-
max time kernel
149s -
max time network
150s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
16-10-2024 22:49
Static task
static1
Behavioral task
behavioral1
Sample
ccfc01451f59118de06d8c111414bd33ce999a4598b7b79e312eb3aed149be9d.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
ccfc01451f59118de06d8c111414bd33ce999a4598b7b79e312eb3aed149be9d.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
ccfc01451f59118de06d8c111414bd33ce999a4598b7b79e312eb3aed149be9d.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
ccfc01451f59118de06d8c111414bd33ce999a4598b7b79e312eb3aed149be9d.apk
-
Size
4.2MB
-
MD5
0f09c871dfa2d2bcde1a1954d2e4fa97
-
SHA1
a514df1d400a0671f2d389809f77f7f0339b4090
-
SHA256
ccfc01451f59118de06d8c111414bd33ce999a4598b7b79e312eb3aed149be9d
-
SHA512
30912f44a4654174ed3a9601ed81c10976e27a59239290bfc02f0689eb741a4900302879bd6f395bbde815f5d65b048bf88774ae5ccda952bba2e14948bcb863
-
SSDEEP
98304:TZnOfqyBXjGz/7Wkp3JMOte4wM0LhIIYaca2GZIwTIENX4G:1nOBq/7fJzBwhYdaaxG
Malware Config
Extracted
hydra
http://aksd24j3232d32kd2j.xyz
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral3/files/fstream-3.dat family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.bqislxvil.slppgtptw/app_dex/classes.dex 4766 com.bqislxvil.slppgtptw /data/user/0/com.bqislxvil.slppgtptw/app_dex/classes.dex 4766 com.bqislxvil.slppgtptw -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.bqislxvil.slppgtptw Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.bqislxvil.slppgtptw -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.bqislxvil.slppgtptw -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.bqislxvil.slppgtptw -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bqislxvil.slppgtptw -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.bqislxvil.slppgtptw -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.bqislxvil.slppgtptw -
Reads information about phone network operator. 1 TTPs
Processes
-
com.bqislxvil.slppgtptw1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
PID:4766
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD52f6d36f7ccbb63469e8d126c2678bd41
SHA1989bbebb8c4e9769273baa177bbb5f068306a64b
SHA25636cd76deba022823a44014498b49692dfdf600ed18a5111b31a896e3a73996fa
SHA512e63fd8f51f6747f1949b0d2ea06f2f06a7f4659df9fb28ef4883e12bc230e03237ba25a961471b187d155ad3d55aa4fef01bc6859704db4f01efb4aa2a9a147b
-
Filesize
1.3MB
MD5c7826592e1689493e0feff6b82b08968
SHA17fe535389082b6134facd5602b0e74108d5497cd
SHA256db44bae201f201ffe1b86dc137e8102e79c9da5597b6ca9f32274e003e72e061
SHA512c20c5094db734ee6818a07c7853f081137196dbbcf3697288dfea6555a1309c8b6e14a29d8e68f1e997d17c1aea0436c7855b4f36ebce39e34b61455b4933723
-
Filesize
1.3MB
MD5c040f97290d45f124647a83245bc93a3
SHA1c2d958944522a7fc96260a6ca9eac03f3957d204
SHA256ea48f15ba96d1dfc70f4736b3de7d02d9cc580822d0941a65cf45e0d2a3955e0
SHA512ccc5f4e01c4794af5ebd97eda6ce4e8bdf4df24f8acea1e03499a910c17a457f8b13157a79ddc4a951187337d4aa6aedc4d6698c933b7e6b324bbe01b7a247b8