Analysis
-
max time kernel
149s -
max time network
161s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
19/10/2024, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090.apk
-
Size
4.9MB
-
MD5
458ddd64d1d6d7f544d4490a826c7c1d
-
SHA1
83da114738b64318cc30bdc8dbc531f618434c0d
-
SHA256
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090
-
SHA512
8486dbc16f025c5c44b5e646ef29c96069d8bcfc5239008492876dc3c68ef8e98d96384f751f47b1f7ad31811e27a28d86e826c28ebc7963d4f76dc7fdd6bb80
-
SSDEEP
98304:MlWskXBXcEZu7Vf5kIp4V5sal942HloRyR1WG97aGE9cVeevatjAA:MlVkZLs/kIwsMFGyvbdaGE2VPatjp
Malware Config
Extracted
hydra
http://darisamu.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral2/files/fstream-3.dat family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.nbkrmsiju.avaxljjcv/app_dex/classes.dex 5066 com.nbkrmsiju.avaxljjcv /data/user/0/com.nbkrmsiju.avaxljjcv/app_dex/classes.dex 5066 com.nbkrmsiju.avaxljjcv -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.nbkrmsiju.avaxljjcv Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.nbkrmsiju.avaxljjcv -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.nbkrmsiju.avaxljjcv -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.nbkrmsiju.avaxljjcv -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nbkrmsiju.avaxljjcv -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.nbkrmsiju.avaxljjcv -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.nbkrmsiju.avaxljjcv -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.nbkrmsiju.avaxljjcv
Processes
-
com.nbkrmsiju.avaxljjcv1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:5066
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5b15c0250154ee0b7dbadb424a4b85c6e
SHA1297f6ff125746db52d3f3be08d5f64899373846d
SHA256ebe18d52e67bc92d5c637b85a6295135c27a2b6912f41b17187fc29fcfebc83d
SHA51214b64fe5a7f5787230b0a97b60df5c25798f4341c89dc2fff9b3d6e678958c1774f0a724b4522f95fc0f35335f5665644228c31441e7161c1863578ed1945fb6
-
Filesize
1.3MB
MD53035dc931e190c49a9842639e0e12c8f
SHA1ec0c92686926865a3f61bb65d5228519527da3db
SHA256f1756928d008258defd125b62b99f5123b3b34ea7368ad577a20b15a1b79bba1
SHA5126278770bf3dc175c7a2af3f8ed7a1d58abe89e078bbe6fa350152bccdd7aefc85069ac617daca68f55bd273e64881e552ed3d2c8a5bdc5d59ff2d22b3689bea8
-
Filesize
1.3MB
MD5bdf74f675d6403e66fcf614e78e2a1ae
SHA1f104a14a163b2ca2195fe932078d7b4194d1bd46
SHA256e820d367c9e927620e3b633c9a84e72c136db42502322aa76cf8fa20f9839d72
SHA5121b747a0ff12cd10f7088a8590d4a7db7656703704d349d757c9bfabba9f1ce479506cb1d54362bc3ecdc8430d7b388971062eeae147417d9d059cddff26abeeb