Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
19-10-2024 22:15
Static task
static1
Behavioral task
behavioral1
Sample
006b9c2bf6cc9d179b493be1385a5dc459ae8a7a4359faf0ecdab944c87081ea.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
006b9c2bf6cc9d179b493be1385a5dc459ae8a7a4359faf0ecdab944c87081ea.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
006b9c2bf6cc9d179b493be1385a5dc459ae8a7a4359faf0ecdab944c87081ea.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
006b9c2bf6cc9d179b493be1385a5dc459ae8a7a4359faf0ecdab944c87081ea.apk
-
Size
4.9MB
-
MD5
5c1061f97f9314a1cc90a0a1c05f9b7f
-
SHA1
6587bb49678097bafbadd391ad437627c36b209a
-
SHA256
006b9c2bf6cc9d179b493be1385a5dc459ae8a7a4359faf0ecdab944c87081ea
-
SHA512
0e74e126efa8321cab855e3e4e0410d8b3990930277e774cb5372d56597f8ef9c58c64463c5ceb2ad69827e60d68ec183414b04a580698d3425c97ceeb235268
-
SSDEEP
98304:RXDObW1Tnc7hgPhL2QZaCdHV7Xp+cAC9RGVNbbytz4jvRJVxWzbXdHaui:dybWhqQ0gHV7Xp+cTRaNTvR/AIui
Malware Config
Extracted
hydra
http://darisamu.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
Processes:
resource yara_rule /data/data/com.wgtyctcrz.jmnormrsi/app_dex/classes.dex family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.wgtyctcrz.jmnormrsiioc pid process /data/user/0/com.wgtyctcrz.jmnormrsi/app_dex/classes.dex 4734 com.wgtyctcrz.jmnormrsi /data/user/0/com.wgtyctcrz.jmnormrsi/app_dex/classes.dex 4734 com.wgtyctcrz.jmnormrsi -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.wgtyctcrz.jmnormrsidescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.wgtyctcrz.jmnormrsi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.wgtyctcrz.jmnormrsi -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
Processes:
com.wgtyctcrz.jmnormrsidescription ioc process URI accessed for read content://com.android.contacts/contacts com.wgtyctcrz.jmnormrsi -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 27 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.wgtyctcrz.jmnormrsidescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.wgtyctcrz.jmnormrsi -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.wgtyctcrz.jmnormrsiioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.wgtyctcrz.jmnormrsi -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.wgtyctcrz.jmnormrsidescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.wgtyctcrz.jmnormrsi -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.wgtyctcrz.jmnormrsidescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.wgtyctcrz.jmnormrsi -
Reads information about phone network operator. 1 TTPs
Processes
-
com.wgtyctcrz.jmnormrsi1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
PID:4734
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD52c787965bd0bb3b11eeca88534edb067
SHA1eb7abc73e32d16b7ac90ff49ee41bfd393d20343
SHA2565555e50681fa470bd24d5967a38c57fdd5bf8a30c166158099aaf507f2381076
SHA5125262aba324cdc1f63f9fe844f4b543905ac1b32328f4a9a2600ba05838ed70c03fade5a39f70c1e4cffed7cd825ed87702aef6f3ff6111cfbd8ce9eb50a9cb45
-
Filesize
1.3MB
MD5a795a5b296d76c86b9eecb893ea1cd02
SHA1aab575bf888cb626ecec8ad2edddb39a552507b3
SHA256afd997571ef21a5783cc3666b79b850051b0bc8519d219d97ef0601b40a9f1ea
SHA512c92252a1fc53b4e18d4e294fc17898ad3eb58d8646d7ab844f9f1492e197e257db509fe48a4dd8e2f975404e29eb043b3b6c311f55a24f628c51ec78f0e26565
-
Filesize
1.3MB
MD522729086b6dba708a7cef178ece2f2b7
SHA18aacfb5fcb9b5ab118c1f5142e9e8ae4e57d89d9
SHA256638c3b2e9b423debf6b654223f335ecbf1d0eff2e41673d32391267a40eef0bd
SHA512df9422375eae334d55ade562f919e291e420def9aef5e981a16b908a7d8c5ee8b65a15dd2e963f3a9dde8005b42a0541b909661a918862f5a8e5559f800a5a16