Analysis
-
max time kernel
149s -
max time network
156s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
19/10/2024, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090.apk
-
Size
4.9MB
-
MD5
458ddd64d1d6d7f544d4490a826c7c1d
-
SHA1
83da114738b64318cc30bdc8dbc531f618434c0d
-
SHA256
e70005261fb082e96aa15ac99d24274300cdba8bdd36f20651c35b75f3b9b090
-
SHA512
8486dbc16f025c5c44b5e646ef29c96069d8bcfc5239008492876dc3c68ef8e98d96384f751f47b1f7ad31811e27a28d86e826c28ebc7963d4f76dc7fdd6bb80
-
SSDEEP
98304:MlWskXBXcEZu7Vf5kIp4V5sal942HloRyR1WG97aGE9cVeevatjAA:MlVkZLs/kIwsMFGyvbdaGE2VPatjp
Malware Config
Extracted
hydra
http://darisamu.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral3/files/fstream-3.dat family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.nbkrmsiju.avaxljjcv/app_dex/classes.dex 4496 com.nbkrmsiju.avaxljjcv /data/user/0/com.nbkrmsiju.avaxljjcv/app_dex/classes.dex 4496 com.nbkrmsiju.avaxljjcv -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.nbkrmsiju.avaxljjcv Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.nbkrmsiju.avaxljjcv -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.nbkrmsiju.avaxljjcv -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.nbkrmsiju.avaxljjcv -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nbkrmsiju.avaxljjcv -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.nbkrmsiju.avaxljjcv -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.nbkrmsiju.avaxljjcv -
Reads information about phone network operator. 1 TTPs
Processes
-
com.nbkrmsiju.avaxljjcv1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
PID:4496
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5b15c0250154ee0b7dbadb424a4b85c6e
SHA1297f6ff125746db52d3f3be08d5f64899373846d
SHA256ebe18d52e67bc92d5c637b85a6295135c27a2b6912f41b17187fc29fcfebc83d
SHA51214b64fe5a7f5787230b0a97b60df5c25798f4341c89dc2fff9b3d6e678958c1774f0a724b4522f95fc0f35335f5665644228c31441e7161c1863578ed1945fb6
-
Filesize
1.3MB
MD53035dc931e190c49a9842639e0e12c8f
SHA1ec0c92686926865a3f61bb65d5228519527da3db
SHA256f1756928d008258defd125b62b99f5123b3b34ea7368ad577a20b15a1b79bba1
SHA5126278770bf3dc175c7a2af3f8ed7a1d58abe89e078bbe6fa350152bccdd7aefc85069ac617daca68f55bd273e64881e552ed3d2c8a5bdc5d59ff2d22b3689bea8
-
Filesize
1.3MB
MD5bdf74f675d6403e66fcf614e78e2a1ae
SHA1f104a14a163b2ca2195fe932078d7b4194d1bd46
SHA256e820d367c9e927620e3b633c9a84e72c136db42502322aa76cf8fa20f9839d72
SHA5121b747a0ff12cd10f7088a8590d4a7db7656703704d349d757c9bfabba9f1ce479506cb1d54362bc3ecdc8430d7b388971062eeae147417d9d059cddff26abeeb