Analysis

  • max time kernel
    148s
  • max time network
    160s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    20/10/2024, 22:06

General

  • Target

    c19c8e871b7731c549c1d3907bd1c093d3f2e80074b5d1fcc639f7eba680d85f.apk

  • Size

    4.9MB

  • MD5

    6f7be0b55b3e485f7a24b34a840a8757

  • SHA1

    b977d58b97a6c38896eec781c76fc5c73688edd2

  • SHA256

    c19c8e871b7731c549c1d3907bd1c093d3f2e80074b5d1fcc639f7eba680d85f

  • SHA512

    e905a22f1f4881fa92c25e66a97382b3b6ea69878e306bf672d7e020a6c964550b12c24a629ad044320fa1a085cb4283d86dc15b437da6cd9ee7d1846801a4e6

  • SSDEEP

    98304:neb9JaWCLpz2lF2u1eON8F10uIT1OGt+4uku+PFgawpwS8/1LPEE:npLbn70uC1O++Qu+Paw11Lt

Malware Config

Extracted

Family

hydra

C2

http://albinecominetoksos.xyz

DES_key

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Reads the contacts stored on the device. 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs

Processes

  • com.khnyfxdsq.wtnquhqct
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Reads the contacts stored on the device.
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    PID:4624

Network

        MITRE ATT&CK Mobile v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /data/data/com.khnyfxdsq.wtnquhqct/app_apk/payload.apk

          Filesize

          974KB

          MD5

          3baeaa766ea7f31a9147208efd957c75

          SHA1

          c701de3d0e55425394ccbf8e0967639e86f3c54e

          SHA256

          75e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d

          SHA512

          9f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f

        • /data/data/com.khnyfxdsq.wtnquhqct/app_dex/classes.dex

          Filesize

          2.7MB

          MD5

          826d59856c01e0d9985f25dd86f075fa

          SHA1

          6cca2cd7b718625cff4ff2b803851407862e5458

          SHA256

          55269e1c0583d171dadf5a7580772bc98022a214c7551b205d0447b247e31ee4

          SHA512

          f089234b5567dccaa69b39f4b05a630f165ac811f5f14c165db6c42b9ca41be9d9b90e8ea12253f1c8a74f90880b26e059b89e9abc0760221c36a8c36748a81d

        • /data/data/com.khnyfxdsq.wtnquhqct/cache/UDEhFkLux3ftQZEWJpunblZQrB15OaNxgK6rfaZG.zip

          Filesize

          23.9MB

          MD5

          74e30f541a37563fe5ae276e605c91d6

          SHA1

          12a9b9d9e9512dd953876ceb6075cf353a38fa53

          SHA256

          deab5c27557c984035e433902efa3127ad60675049284e2ecfdb7ff343fe1a0e

          SHA512

          9a74969992b20d9b68ad381e0a93678ec632262a5948bf7333310d3d6faa6df30531339c7ced16804209e788faf6fe4586b718ee6143aa7a4d2dbc461682bc37

        • /data/data/com.khnyfxdsq.wtnquhqct/cache/classes.dex

          Filesize

          1.3MB

          MD5

          932284bbf3b9dc311c86d2206afcdfd1

          SHA1

          d3d7d3fe1f90f4555495217d65c29fa11c7958a9

          SHA256

          44791cd6ecc51635593d36c326beec456c85c36eadb3771c80e3385e9bbeade6

          SHA512

          aea1a06665cd2af3b459443af26408390c26687cc78821f7fb7dee4f43d3f6549a1ae94588c8fbab364616ad569564a4ed7798426d4590c38168b0a0b36f3ca4

        • /data/data/com.khnyfxdsq.wtnquhqct/cache/classes.zip

          Filesize

          1.3MB

          MD5

          6b8bee79ad8458b2a2f82fe6bc384025

          SHA1

          5efe2231e72f78e8d72dad6386db9b6af9ef8877

          SHA256

          18bb0bd2d2f32b48df995e45d825fd14fe288cc7d525e6a4671ebabb47929ef0

          SHA512

          8382b44113eeab11be0cb1669db43214f7912238e0b69566dc3f35b1c3412836229898c79ae800af20b2027be55afa0a42d6799a5b13f96db8ecd843900f43f5