Analysis
-
max time kernel
149s -
max time network
148s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
19-10-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090.apk
-
Size
4.9MB
-
MD5
458ddd64d1d6d7f544d4490a826c7c1d
-
SHA1
83da114738b64318cc30bdc8dbc531f618434c0d
-
SHA256
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090
-
SHA512
8486dbc16f025c5c44b5e646ef29c96069d8bcfc5239008492876dc3c68ef8e98d96384f751f47b1f7ad31811e27a28d86e826c28ebc7963d4f76dc7fdd6bb80
-
SSDEEP
98304:MlWskXBXcEZu7Vf5kIp4V5sal942HloRyR1WG97aGE9cVeevatjAA:MlVkZLs/kIwsMFGyvbdaGE2VPatjp
Malware Config
Extracted
hydra
http://darisamu.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 2 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_hydra2 behavioral1/memory/4262-1.dex family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.nbkrmsiju.avaxljjcv/app_dex/classes.dex 4262 com.nbkrmsiju.avaxljjcv /data/user/0/com.nbkrmsiju.avaxljjcv/app_dex/classes.dex 4290 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.nbkrmsiju.avaxljjcv/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.nbkrmsiju.avaxljjcv/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.nbkrmsiju.avaxljjcv/app_dex/classes.dex 4262 com.nbkrmsiju.avaxljjcv -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.nbkrmsiju.avaxljjcv Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.nbkrmsiju.avaxljjcv -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.nbkrmsiju.avaxljjcv -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.nbkrmsiju.avaxljjcv -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nbkrmsiju.avaxljjcv -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.nbkrmsiju.avaxljjcv -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.nbkrmsiju.avaxljjcv -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.nbkrmsiju.avaxljjcv
Processes
-
com.nbkrmsiju.avaxljjcv1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4262 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.nbkrmsiju.avaxljjcv/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.nbkrmsiju.avaxljjcv/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4290
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5b15c0250154ee0b7dbadb424a4b85c6e
SHA1297f6ff125746db52d3f3be08d5f64899373846d
SHA256ebe18d52e67bc92d5c637b85a6295135c27a2b6912f41b17187fc29fcfebc83d
SHA51214b64fe5a7f5787230b0a97b60df5c25798f4341c89dc2fff9b3d6e678958c1774f0a724b4522f95fc0f35335f5665644228c31441e7161c1863578ed1945fb6
-
Filesize
1.3MB
MD53035dc931e190c49a9842639e0e12c8f
SHA1ec0c92686926865a3f61bb65d5228519527da3db
SHA256f1756928d008258defd125b62b99f5123b3b34ea7368ad577a20b15a1b79bba1
SHA5126278770bf3dc175c7a2af3f8ed7a1d58abe89e078bbe6fa350152bccdd7aefc85069ac617daca68f55bd273e64881e552ed3d2c8a5bdc5d59ff2d22b3689bea8
-
Filesize
1.3MB
MD5bdf74f675d6403e66fcf614e78e2a1ae
SHA1f104a14a163b2ca2195fe932078d7b4194d1bd46
SHA256e820d367c9e927620e3b633c9a84e72c136db42502322aa76cf8fa20f9839d72
SHA5121b747a0ff12cd10f7088a8590d4a7db7656703704d349d757c9bfabba9f1ce479506cb1d54362bc3ecdc8430d7b388971062eeae147417d9d059cddff26abeeb
-
Filesize
2.7MB
MD54408abdcccc6d340ae085adb179ec819
SHA10bc9c594d3cdd136b754380354353206ffb30387
SHA256c1cef3111489b0dda765235132747b75ae5ada16c5e528da176c9ad8c8596592
SHA512faeef5a4574e9700ca757e3765b42a15a4871c1259b6b8bc1fe5ca9698135c7c7100cb83fcf53210d1050e34235b3393bdeef596c6fd9117708c45b170248701