General
-
Target
105affcbfc1afa6f804d47c5587becc0ca741b70fce448afa0dff3b86b9ab4b2.bin
-
Size
2.2MB
-
Sample
241021-12sh2szbmg
-
MD5
df6546b86b318a2850fa850ec71a7fcb
-
SHA1
8a215df9bd136ed0d8449fc3f11177b1c07cde6d
-
SHA256
105affcbfc1afa6f804d47c5587becc0ca741b70fce448afa0dff3b86b9ab4b2
-
SHA512
da4f6158b2fb0f1cfefd22578cbe6143fd7b884d1468433dbb20d4214bd2ea2f94aa7850d8f396d7fabfea534ff336d12972b4db18a9d8cf20471077e3c7c2e4
-
SSDEEP
49152:llE9y+wqENZFO78w1O6st+8X4/blqeZeVbiOvTKSaHbZ3+Ejt:llEkqENZ4O6sthX4U/VGgraHtuEjt
Static task
static1
Behavioral task
behavioral1
Sample
105affcbfc1afa6f804d47c5587becc0ca741b70fce448afa0dff3b86b9ab4b2.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
105affcbfc1afa6f804d47c5587becc0ca741b70fce448afa0dff3b86b9ab4b2.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
105affcbfc1afa6f804d47c5587becc0ca741b70fce448afa0dff3b86b9ab4b2.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
hydra
http://silversilvershine.com
Targets
-
-
Target
105affcbfc1afa6f804d47c5587becc0ca741b70fce448afa0dff3b86b9ab4b2.bin
-
Size
2.2MB
-
MD5
df6546b86b318a2850fa850ec71a7fcb
-
SHA1
8a215df9bd136ed0d8449fc3f11177b1c07cde6d
-
SHA256
105affcbfc1afa6f804d47c5587becc0ca741b70fce448afa0dff3b86b9ab4b2
-
SHA512
da4f6158b2fb0f1cfefd22578cbe6143fd7b884d1468433dbb20d4214bd2ea2f94aa7850d8f396d7fabfea534ff336d12972b4db18a9d8cf20471077e3c7c2e4
-
SSDEEP
49152:llE9y+wqENZFO78w1O6st+8X4/blqeZeVbiOvTKSaHbZ3+Ejt:llEkqENZ4O6sthX4U/VGgraHtuEjt
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Reads the contacts stored on the device.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1