General
-
Target
cf61fabe36b8e414e9a68e45527e59f479febbb5a5063c5615b0ee7e264cf9fb.bin
-
Size
4.4MB
-
Sample
241021-1x5mta1epk
-
MD5
08c28b133e548fb3635ab74076e565a5
-
SHA1
f04f1e62ae4bf2af4d976d25946abe1e242740ce
-
SHA256
cf61fabe36b8e414e9a68e45527e59f479febbb5a5063c5615b0ee7e264cf9fb
-
SHA512
6419d3a571a60fd19452e0420b00da0d309add7f46c9fe0a865dbfd654e9c0cc0c2db1d300a1b38f84b69ce5efd4621ad073ccd16f79fbceab49382c7f76099f
-
SSDEEP
98304:veaIDq984A4UaWIgJ4Bltvf3TENVZVwMa2gECLj060LeJuPvgNaQtyMT35u4snJt:FIGzA4OIgJ4BltnwbZLa2VCLOLeJungm
Static task
static1
Behavioral task
behavioral1
Sample
cf61fabe36b8e414e9a68e45527e59f479febbb5a5063c5615b0ee7e264cf9fb.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
cf61fabe36b8e414e9a68e45527e59f479febbb5a5063c5615b0ee7e264cf9fb.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
cf61fabe36b8e414e9a68e45527e59f479febbb5a5063c5615b0ee7e264cf9fb.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
hydra
http://haluksamu.com
Targets
-
-
Target
cf61fabe36b8e414e9a68e45527e59f479febbb5a5063c5615b0ee7e264cf9fb.bin
-
Size
4.4MB
-
MD5
08c28b133e548fb3635ab74076e565a5
-
SHA1
f04f1e62ae4bf2af4d976d25946abe1e242740ce
-
SHA256
cf61fabe36b8e414e9a68e45527e59f479febbb5a5063c5615b0ee7e264cf9fb
-
SHA512
6419d3a571a60fd19452e0420b00da0d309add7f46c9fe0a865dbfd654e9c0cc0c2db1d300a1b38f84b69ce5efd4621ad073ccd16f79fbceab49382c7f76099f
-
SSDEEP
98304:veaIDq984A4UaWIgJ4Bltvf3TENVZVwMa2gECLj060LeJuPvgNaQtyMT35u4snJt:FIGzA4OIgJ4BltnwbZLa2VCLOLeJungm
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Reads the contacts stored on the device.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1