Analysis
-
max time kernel
148s -
max time network
157s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
19-10-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
5cf3c42df6108e5cfba40917a4b26e4ff7de3971826116f84ae94d91ada87f8c.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
5cf3c42df6108e5cfba40917a4b26e4ff7de3971826116f84ae94d91ada87f8c.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
5cf3c42df6108e5cfba40917a4b26e4ff7de3971826116f84ae94d91ada87f8c.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
5cf3c42df6108e5cfba40917a4b26e4ff7de3971826116f84ae94d91ada87f8c.apk
-
Size
4.4MB
-
MD5
feb0ce6aa37f05709d90050d85b6dab2
-
SHA1
c5a6ccf21f70bf769e1f98460a65809575de1ae7
-
SHA256
5cf3c42df6108e5cfba40917a4b26e4ff7de3971826116f84ae94d91ada87f8c
-
SHA512
ada2c797c838df1e5c211b152f092ecb950e70a406ead4052ec7fddfa3d13b2ce5ecd87b4ae3ef5656c12cce0b0a64ef2f1b0aaa0f75f35e3a9cb36ad499c735
-
SSDEEP
98304:ebt5qfxMiVJcfyoEOWYSe8YTW5tYtMKBB2K9N:ebPHSJc63pe/y5tcMaB2gN
Malware Config
Extracted
hydra
http://halukdari.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 1 IoCs
resource yara_rule behavioral3/files/fstream-3.dat family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.isvsphxrm.yspbthlrh/app_dex/classes.dex 4623 com.isvsphxrm.yspbthlrh /data/user/0/com.isvsphxrm.yspbthlrh/app_dex/classes.dex 4623 com.isvsphxrm.yspbthlrh -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.isvsphxrm.yspbthlrh Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.isvsphxrm.yspbthlrh -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.isvsphxrm.yspbthlrh -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.isvsphxrm.yspbthlrh -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.isvsphxrm.yspbthlrh -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.isvsphxrm.yspbthlrh -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.isvsphxrm.yspbthlrh -
Reads information about phone network operator. 1 TTPs
Processes
-
com.isvsphxrm.yspbthlrh1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
PID:4623
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
974KB
MD53baeaa766ea7f31a9147208efd957c75
SHA1c701de3d0e55425394ccbf8e0967639e86f3c54e
SHA25675e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d
SHA5129f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f
-
Filesize
2.7MB
MD5104bd3721fb3ea7a80569c8f12a6f825
SHA1538fbf0f40c3e8d2cb9bf4a4fb9f015239c55942
SHA256063c7892cfe25c87eb0f7c3268b16fbed7189fec9f2ee732c628a8a18a35ec76
SHA5123e7c3837d238363c7a79a1d3fb65d35adf387d3a2d70d815b8f4b166eddfc57585686bfb84610766dffe9debcfb06870af89c30dc8b6fff039fffffe274d6e9b
-
Filesize
1.3MB
MD577ad5069a51cbeefe4d94bddd0c57d8d
SHA179a1501f0da11f2b15ebe51e89edc23e59672d08
SHA25677bead88b46487130a686e1472184e9c18b87da65c022418c80cefb899247094
SHA512f951b81a6e1f4ff9ac653f4fbf42eee766804bd96b833c887eb07067fe9e153c3f6552f7731774b3c4555f145450df77a2f14ba23f61d4a6219ce9ebd911b84f
-
Filesize
1.3MB
MD5ea551ac69a00780fb800b7bd313080b0
SHA1cfd31c4b63cbb9ff2e7ff662be41451881b371dd
SHA2560aa1079241a43a356e573b3e9b97d4a920736b46310a4d2dc5deacfba7cb1943
SHA512296adba604f2f56e4c79cdf18674c053d70256eebbd6ba7dcdbc8244ccaba6433099c9016a8dc2ff38402cd6883df8105092d2d960730d3e5079c3e1b22d8b4f
-
Filesize
422KB
MD591270944f0fe17b7015339643ce88fe7
SHA13f1a8c6ab834f68e62b9580ca65413e465b8257a
SHA2561ac3dd3552b71636f949ea49ec8e1c49f880ada66b3f016d0ebb42e0ae2fbc8d
SHA5128ae2a0ffe836dbc0d163a4f4751c24d8d1c00b922788d0d195cca3c2ec8ecea4f3ff4be2ec8e4132afd4434a3281dffece7e7264219eb4a1d4ec28e5516fce18
-
Filesize
2.2MB
MD5d98339dbaf301a7e0a6b66a7f990073a
SHA1d1b4a9eb4b5a80d7315e76fd9e8386463741f2c6
SHA25669f1586fc4d81f40fa53255e11995efefd0be5dd4aee4bbd73837383558026da
SHA512db4316d515d6e2311aa4f0385f3c0cd2d293fcb7d3f0be5c709c1e1bcfed2b3fab612952ea7018ad5ace563d81cdacbb4ea86a1fc935a90124fd6108f9b81087
-
Filesize
1.6MB
MD5869882ff14083e1de3ccd39f0a22b7e8
SHA1b9a897aa3d33da348c4b34d29579621b11f5c6ca
SHA2562bdf6bb1986006edaf4e7df6f66af17304b7722360b26e434ee5589a5d28554a
SHA5128b18a0c781349d8e2d10138d5caa9e0027c1c8838d0f3b49ef399f8fec1adf5a33b9871740eea33a94f2baa4af195834af6bc6bf75a71ff9de9dbb3d11db0d1f
-
Filesize
3.3MB
MD502163f9b76d1aaffa34753643e2e323f
SHA1ed87f3ce908379db8a96e9ca070c2f09ff8d8323
SHA256d5910f0d7edf67bd90f014d1b54975342384b8af37e6af0e8abb08acdd3d8066
SHA51247f90c75fcbc71c02e39da2dd29fb9ce105d4e8021bacb36699cee315f21488ab2f8f6e43be0b11293f8553bb5ec59bd5e6a16be4b1fe123c357c4a88e3719ce