General
-
Target
3cbb781b869982c73980cea6e96aa18f9d1f4aaee96ced38291c2481adb44ccd.bin
-
Size
5.0MB
-
Sample
241019-16g8wascqa
-
MD5
b5f231d6028f434a98ca31b81d4ee6b5
-
SHA1
b23cf7c3c7a04973a428f8ec6a052fc62143888b
-
SHA256
3cbb781b869982c73980cea6e96aa18f9d1f4aaee96ced38291c2481adb44ccd
-
SHA512
668aa7274ba674e612317f69dae427df881d4c9c140996e8d7f89e7c3efb66ccd133748f9b4558c15a1c0ebe093fde91d107e013baa2a405f6d0f4af03339dae
-
SSDEEP
98304:k/Ix+SSeBexGm/KaOTgWRluKG+pkG0kjW+GTrWeNS:hx+SCxGmiVluKxbW+GGMS
Static task
static1
Behavioral task
behavioral1
Sample
3cbb781b869982c73980cea6e96aa18f9d1f4aaee96ced38291c2481adb44ccd.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
3cbb781b869982c73980cea6e96aa18f9d1f4aaee96ced38291c2481adb44ccd.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
3cbb781b869982c73980cea6e96aa18f9d1f4aaee96ced38291c2481adb44ccd.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
hydra
http://darisamu.com
Targets
-
-
Target
3cbb781b869982c73980cea6e96aa18f9d1f4aaee96ced38291c2481adb44ccd.bin
-
Size
5.0MB
-
MD5
b5f231d6028f434a98ca31b81d4ee6b5
-
SHA1
b23cf7c3c7a04973a428f8ec6a052fc62143888b
-
SHA256
3cbb781b869982c73980cea6e96aa18f9d1f4aaee96ced38291c2481adb44ccd
-
SHA512
668aa7274ba674e612317f69dae427df881d4c9c140996e8d7f89e7c3efb66ccd133748f9b4558c15a1c0ebe093fde91d107e013baa2a405f6d0f4af03339dae
-
SSDEEP
98304:k/Ix+SSeBexGm/KaOTgWRluKG+pkG0kjW+GTrWeNS:hx+SCxGmiVluKxbW+GGMS
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Reads the contacts stored on the device.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1