General

  • Target

    666ddaf9df5cbf3aa155e0652629dd15ce9ab57771dee84f9dc48a782087e72f.bin

  • Size

    4.4MB

  • Sample

    241019-1yj3ha1gmg

  • MD5

    e803f7b24c78862ce9e71ecfe5fb2909

  • SHA1

    ed17916d60e5bd1c4a1dc9b671baadd36982b5a5

  • SHA256

    666ddaf9df5cbf3aa155e0652629dd15ce9ab57771dee84f9dc48a782087e72f

  • SHA512

    05b10ef88287b318fa6eb97e3feb35fcd7914f908d8caca7cd0c41f1469dc16f5de429138594b5d985cc91d2975e8e8a66fb7bdb6a18851906aa11c23f22e650

  • SSDEEP

    98304:u4hTb4pu13VtRmC8OqYjYpZyLZYmT+KBLmKj1w3ta6t:u4h4puHvjqmYpg+oYa6t

Malware Config

Extracted

Family

hydra

C2

http://halukdari.com

DES_key

Targets

    • Target

      666ddaf9df5cbf3aa155e0652629dd15ce9ab57771dee84f9dc48a782087e72f.bin

    • Size

      4.4MB

    • MD5

      e803f7b24c78862ce9e71ecfe5fb2909

    • SHA1

      ed17916d60e5bd1c4a1dc9b671baadd36982b5a5

    • SHA256

      666ddaf9df5cbf3aa155e0652629dd15ce9ab57771dee84f9dc48a782087e72f

    • SHA512

      05b10ef88287b318fa6eb97e3feb35fcd7914f908d8caca7cd0c41f1469dc16f5de429138594b5d985cc91d2975e8e8a66fb7bdb6a18851906aa11c23f22e650

    • SSDEEP

      98304:u4hTb4pu13VtRmC8OqYjYpZyLZYmT+KBLmKj1w3ta6t:u4h4puHvjqmYpg+oYa6t

    • Hydra

      Android banker and info stealer.

    • Hydra payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads the contacts stored on the device.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks