Analysis
-
max time kernel
149s -
max time network
157s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
19-10-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
5cf3c42df6108e5cfba40917a4b26e4ff7de3971826116f84ae94d91ada87f8c.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
5cf3c42df6108e5cfba40917a4b26e4ff7de3971826116f84ae94d91ada87f8c.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
5cf3c42df6108e5cfba40917a4b26e4ff7de3971826116f84ae94d91ada87f8c.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
5cf3c42df6108e5cfba40917a4b26e4ff7de3971826116f84ae94d91ada87f8c.apk
-
Size
4.4MB
-
MD5
feb0ce6aa37f05709d90050d85b6dab2
-
SHA1
c5a6ccf21f70bf769e1f98460a65809575de1ae7
-
SHA256
5cf3c42df6108e5cfba40917a4b26e4ff7de3971826116f84ae94d91ada87f8c
-
SHA512
ada2c797c838df1e5c211b152f092ecb950e70a406ead4052ec7fddfa3d13b2ce5ecd87b4ae3ef5656c12cce0b0a64ef2f1b0aaa0f75f35e3a9cb36ad499c735
-
SSDEEP
98304:ebt5qfxMiVJcfyoEOWYSe8YTW5tYtMKBB2K9N:ebPHSJc63pe/y5tcMaB2gN
Malware Config
Extracted
hydra
http://halukdari.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.isvsphxrm.yspbthlrh/app_dex/classes.dex 4221 com.isvsphxrm.yspbthlrh /data/user/0/com.isvsphxrm.yspbthlrh/app_dex/classes.dex 4221 com.isvsphxrm.yspbthlrh -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.isvsphxrm.yspbthlrh Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.isvsphxrm.yspbthlrh -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.isvsphxrm.yspbthlrh -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.isvsphxrm.yspbthlrh -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.isvsphxrm.yspbthlrh -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.isvsphxrm.yspbthlrh -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.isvsphxrm.yspbthlrh -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.isvsphxrm.yspbthlrh
Processes
-
com.isvsphxrm.yspbthlrh1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4221
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
974KB
MD53baeaa766ea7f31a9147208efd957c75
SHA1c701de3d0e55425394ccbf8e0967639e86f3c54e
SHA25675e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d
SHA5129f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f
-
Filesize
2.7MB
MD5104bd3721fb3ea7a80569c8f12a6f825
SHA1538fbf0f40c3e8d2cb9bf4a4fb9f015239c55942
SHA256063c7892cfe25c87eb0f7c3268b16fbed7189fec9f2ee732c628a8a18a35ec76
SHA5123e7c3837d238363c7a79a1d3fb65d35adf387d3a2d70d815b8f4b166eddfc57585686bfb84610766dffe9debcfb06870af89c30dc8b6fff039fffffe274d6e9b
-
Filesize
1.3MB
MD577ad5069a51cbeefe4d94bddd0c57d8d
SHA179a1501f0da11f2b15ebe51e89edc23e59672d08
SHA25677bead88b46487130a686e1472184e9c18b87da65c022418c80cefb899247094
SHA512f951b81a6e1f4ff9ac653f4fbf42eee766804bd96b833c887eb07067fe9e153c3f6552f7731774b3c4555f145450df77a2f14ba23f61d4a6219ce9ebd911b84f
-
Filesize
1.3MB
MD5ea551ac69a00780fb800b7bd313080b0
SHA1cfd31c4b63cbb9ff2e7ff662be41451881b371dd
SHA2560aa1079241a43a356e573b3e9b97d4a920736b46310a4d2dc5deacfba7cb1943
SHA512296adba604f2f56e4c79cdf18674c053d70256eebbd6ba7dcdbc8244ccaba6433099c9016a8dc2ff38402cd6883df8105092d2d960730d3e5079c3e1b22d8b4f
-
Filesize
4.9MB
MD56e841df86fa7b41e834e72c5f0dcf4b2
SHA116407f2099ac91cdffb591dc263e095b7fc61eef
SHA25614fb5371d3be3be48b098a25a83cb36047ad3f1bcdc17929cf67af5fdc44f96d
SHA5128891ecce1fce11535fbf47a4e70662778ed6eb7753374daa169de89797d54c5827fb9184278bdfa8bf7f7f8006c0b0e3b84d43e906f753348e282d0bf2e2fe19
-
Filesize
4.0MB
MD54bfb7db05713c67c9bbffe039f65ed8d
SHA10299fa85152964c72acefff3842fc11aeb6be0d9
SHA25628af4b996793333b03441711c0fe7d9664bd39000ce262d9b34c465073233bcc
SHA5126d1e94f71be61e5c909fc9ca2faa86294ab457c2357f6480d831d9bb87304d4358b33329f9c7c9685c36fa4f38ae294ab613532eec8f773a09ff5420a1cfb699