Analysis

  • max time kernel
    149s
  • max time network
    160s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    20-10-2024 22:06

General

  • Target

    c19c8e871b7731c549c1d3907bd1c093d3f2e80074b5d1fcc639f7eba680d85f.apk

  • Size

    4.9MB

  • MD5

    6f7be0b55b3e485f7a24b34a840a8757

  • SHA1

    b977d58b97a6c38896eec781c76fc5c73688edd2

  • SHA256

    c19c8e871b7731c549c1d3907bd1c093d3f2e80074b5d1fcc639f7eba680d85f

  • SHA512

    e905a22f1f4881fa92c25e66a97382b3b6ea69878e306bf672d7e020a6c964550b12c24a629ad044320fa1a085cb4283d86dc15b437da6cd9ee7d1846801a4e6

  • SSDEEP

    98304:neb9JaWCLpz2lF2u1eON8F10uIT1OGt+4uku+PFgawpwS8/1LPEE:npLbn70uC1O++Qu+Paw11Lt

Malware Config

Extracted

Family

hydra

C2

http://albinecominetoksos.xyz

DES_key

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Reads the contacts stored on the device. 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs

Processes

  • com.khnyfxdsq.wtnquhqct
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Reads the contacts stored on the device.
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    PID:5056

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.khnyfxdsq.wtnquhqct/app_apk/payload.apk

    Filesize

    974KB

    MD5

    3baeaa766ea7f31a9147208efd957c75

    SHA1

    c701de3d0e55425394ccbf8e0967639e86f3c54e

    SHA256

    75e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d

    SHA512

    9f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f

  • /data/data/com.khnyfxdsq.wtnquhqct/app_dex/classes.dex

    Filesize

    2.7MB

    MD5

    826d59856c01e0d9985f25dd86f075fa

    SHA1

    6cca2cd7b718625cff4ff2b803851407862e5458

    SHA256

    55269e1c0583d171dadf5a7580772bc98022a214c7551b205d0447b247e31ee4

    SHA512

    f089234b5567dccaa69b39f4b05a630f165ac811f5f14c165db6c42b9ca41be9d9b90e8ea12253f1c8a74f90880b26e059b89e9abc0760221c36a8c36748a81d

  • /data/data/com.khnyfxdsq.wtnquhqct/cache/UDEhFkLux3ftQZEWJpunblZQrB15OaNxgK6rfaZG.zip

    Filesize

    11.2MB

    MD5

    c3061d6ef27a816cd82ed8195419d7d4

    SHA1

    af50ff2571e6ee5f8c97d34454dfb54426986b95

    SHA256

    440797cba50678def2f837b99841547219b44ac0fb2aed214b48c1bde1876736

    SHA512

    2244e6bd4f51ced855c542105204ed5992b88902660d4068f4dd3e196d15dee1ed0ede1ac57b17f8aca69699fc77b18a79c27899ee775bf65d000fbf8ed1e0f2

  • /data/data/com.khnyfxdsq.wtnquhqct/cache/UDEhFkLux3ftQZEWJpunblZQrB15OaNxgK6rfaZG.zip

    Filesize

    8.8MB

    MD5

    4aca65eb3f955e06106f75044597cb71

    SHA1

    8a2d00cee6803fa010105dc9c625a1695d438a3c

    SHA256

    7e1ba74a7182b6a2d205f34cb5f35e5a2a5b844efc63a6a7c3a95113d42acb25

    SHA512

    d57d1b524b9000046dfaf05c19f1e858a9ecbafaba9e1d421c50e77c3e61e3f91eb72c6c9a1712bdb69a4995940d5a418128e2ac3c654d45479ae1995b704911

  • /data/data/com.khnyfxdsq.wtnquhqct/cache/classes.dex

    Filesize

    1.3MB

    MD5

    932284bbf3b9dc311c86d2206afcdfd1

    SHA1

    d3d7d3fe1f90f4555495217d65c29fa11c7958a9

    SHA256

    44791cd6ecc51635593d36c326beec456c85c36eadb3771c80e3385e9bbeade6

    SHA512

    aea1a06665cd2af3b459443af26408390c26687cc78821f7fb7dee4f43d3f6549a1ae94588c8fbab364616ad569564a4ed7798426d4590c38168b0a0b36f3ca4

  • /data/data/com.khnyfxdsq.wtnquhqct/cache/classes.zip

    Filesize

    1.3MB

    MD5

    6b8bee79ad8458b2a2f82fe6bc384025

    SHA1

    5efe2231e72f78e8d72dad6386db9b6af9ef8877

    SHA256

    18bb0bd2d2f32b48df995e45d825fd14fe288cc7d525e6a4671ebabb47929ef0

    SHA512

    8382b44113eeab11be0cb1669db43214f7912238e0b69566dc3f35b1c3412836229898c79ae800af20b2027be55afa0a42d6799a5b13f96db8ecd843900f43f5