General
-
Target
1b5c005dd0bc9668d2d6bf2aa7ec816d983914cae75296844d21c8ccff760c78.bin
-
Size
4.4MB
-
Sample
241021-1xhhaaygnd
-
MD5
952c44479dd3182acd3af014bc81ad40
-
SHA1
8da4e31a0a4f3ff3d86dca01bec8f0e9d067ffcd
-
SHA256
1b5c005dd0bc9668d2d6bf2aa7ec816d983914cae75296844d21c8ccff760c78
-
SHA512
d734afa70fb16de8e29603b5d4461df55812bc868b12361974a6a00ca54084ddc5990bed54998c2c1a9520098cbd1087e20cfbd926917962813eaea922377987
-
SSDEEP
98304:wex4f2zZnRa9co6k3wi72i8QtynAonGCNyj4:wexNz3af6k3vD3ynBGM
Static task
static1
Behavioral task
behavioral1
Sample
1b5c005dd0bc9668d2d6bf2aa7ec816d983914cae75296844d21c8ccff760c78.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
1b5c005dd0bc9668d2d6bf2aa7ec816d983914cae75296844d21c8ccff760c78.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
1b5c005dd0bc9668d2d6bf2aa7ec816d983914cae75296844d21c8ccff760c78.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
hydra
http://haluksamu.com
Targets
-
-
Target
1b5c005dd0bc9668d2d6bf2aa7ec816d983914cae75296844d21c8ccff760c78.bin
-
Size
4.4MB
-
MD5
952c44479dd3182acd3af014bc81ad40
-
SHA1
8da4e31a0a4f3ff3d86dca01bec8f0e9d067ffcd
-
SHA256
1b5c005dd0bc9668d2d6bf2aa7ec816d983914cae75296844d21c8ccff760c78
-
SHA512
d734afa70fb16de8e29603b5d4461df55812bc868b12361974a6a00ca54084ddc5990bed54998c2c1a9520098cbd1087e20cfbd926917962813eaea922377987
-
SSDEEP
98304:wex4f2zZnRa9co6k3wi72i8QtynAonGCNyj4:wexNz3af6k3vD3ynBGM
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Reads the contacts stored on the device.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1