Analysis
-
max time kernel
149s -
max time network
153s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
21-10-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
cf61fabe36b8e414e9a68e45527e59f479febbb5a5063c5615b0ee7e264cf9fb.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
cf61fabe36b8e414e9a68e45527e59f479febbb5a5063c5615b0ee7e264cf9fb.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
cf61fabe36b8e414e9a68e45527e59f479febbb5a5063c5615b0ee7e264cf9fb.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
cf61fabe36b8e414e9a68e45527e59f479febbb5a5063c5615b0ee7e264cf9fb.apk
-
Size
4.4MB
-
MD5
08c28b133e548fb3635ab74076e565a5
-
SHA1
f04f1e62ae4bf2af4d976d25946abe1e242740ce
-
SHA256
cf61fabe36b8e414e9a68e45527e59f479febbb5a5063c5615b0ee7e264cf9fb
-
SHA512
6419d3a571a60fd19452e0420b00da0d309add7f46c9fe0a865dbfd654e9c0cc0c2db1d300a1b38f84b69ce5efd4621ad073ccd16f79fbceab49382c7f76099f
-
SSDEEP
98304:veaIDq984A4UaWIgJ4Bltvf3TENVZVwMa2gECLj060LeJuPvgNaQtyMT35u4snJt:FIGzA4OIgJ4BltnwbZLa2VCLOLeJungm
Malware Config
Extracted
hydra
http://haluksamu.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra payload 2 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_hydra2 behavioral1/memory/4396-1.dex family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.xqdslasfp.dhfldpzsi/app_dex/classes.dex 4396 com.xqdslasfp.dhfldpzsi /data/user/0/com.xqdslasfp.dhfldpzsi/app_dex/classes.dex 4423 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xqdslasfp.dhfldpzsi/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.xqdslasfp.dhfldpzsi/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.xqdslasfp.dhfldpzsi/app_dex/classes.dex 4396 com.xqdslasfp.dhfldpzsi -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.xqdslasfp.dhfldpzsi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.xqdslasfp.dhfldpzsi -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.xqdslasfp.dhfldpzsi -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.xqdslasfp.dhfldpzsi -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.xqdslasfp.dhfldpzsi -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.xqdslasfp.dhfldpzsi -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.xqdslasfp.dhfldpzsi -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.xqdslasfp.dhfldpzsi
Processes
-
com.xqdslasfp.dhfldpzsi1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4396 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xqdslasfp.dhfldpzsi/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.xqdslasfp.dhfldpzsi/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4423
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5d5e3a97540633d2500dd849b9e4f5166
SHA1bb82f98ec463a77f1b355464fd3f14038c355d49
SHA2567305fddee36ce521c99c1bed73c4c951e5f18b2a1629441f865d6c94effa8786
SHA5127244fcfd47b737e9b3bb926c552cdd4fdc5432f1f4b4554f0937cfabbdec671043c674bf5735a4bb72b67e9505e11b553257261a0813359436e73dbe191f4717
-
Filesize
1.3MB
MD5f6961af86b8e684183b14d7449065e24
SHA1f91ecdbd68493762b3e970ab5c01886a2f331f4c
SHA25612a5d10fcd276aa0eba7788ee20e8a58ffb0f903d52d17e31b4d3edb32a43d17
SHA512347f96d105670b93ba59447ca832f229ba4cf7d2a098892e5444d792634d501a97d6314a413f787edc8bac36bf19521ef5096be952355bb9de2c8c222cba6f23
-
Filesize
1.3MB
MD53cf9313c5ed85ddfc36b44517a768bea
SHA1c27c6843b565fe1c2a3179ecac83647f3fd1f1ba
SHA256491988d6d5149aaed121d89b4ec6feddbc090c26c42b8e35e9582ef5dfa8d068
SHA512585e110e408e196a6fe8e65f1d9a752db21620ea1b0f362426e9696d6cd6afb6b516f0e958fa4b51741cfa01faf05fb4749c9489dbfad21c1e386da8db1be27b
-
Filesize
2.7MB
MD5601dd5a8c8b10c9deafaac5513053a02
SHA10d9c4ecb6351228a10bb5378ea03b1ab9c50c02a
SHA2560fae2f0726878dc53e1ca72ce73d97fb65bfa89dc87969739a79f193bbbadb5d
SHA512d01459fbaa0628b20a8287ffe593966d8e1635be06dd9510029282ef2382b294e054287ee2c439570208e0563d5f42b6cb69e1615a3db2b46d0911b33f200766