General

  • Target

    231203-1w1mgafe52_pw_infected.apk.zip

  • Size

    1.0MB

  • Sample

    241104-qzlbvazlfz

  • MD5

    5c5f2a5f3b315337a696ca8446d92e9a

  • SHA1

    1641297ed4619d1905b14b84df0d670813047e3f

  • SHA256

    fa0729fc2182ba0732f24072f20cfb9545f4ffd3aa0378d086117a4b260db215

  • SHA512

    d44b644eab07b86ed4c097f9aa241f371a01840d6bf586688ceb197cd13b1c1c48c77dd559bbeb8e55d4aca102ee6f5687234be2cbf769f85455f128e2ecca55

  • SSDEEP

    24576:TKxHPAZ3hVMFG9Scj3YXcxwgJeCkPwswGr5eWWipT0R:oYZYFG9Sc7YdgkCW0WWiA

Malware Config

Extracted

Family

hydra

C2

http://saygolezdolemeze.com

Targets

    • Target

      2e84fd3484fcde105c437f1c0366954f4bdee7c1d3b334e2daa366a6592e4432.bin

    • Size

      1.1MB

    • MD5

      ed8e1765965e5c74cfb6793876e59466

    • SHA1

      0f58b62fdbe09d50dcfb58797754af718e0911e3

    • SHA256

      2e84fd3484fcde105c437f1c0366954f4bdee7c1d3b334e2daa366a6592e4432

    • SHA512

      fcb7716d50c2395df3096b826a24c2236333fb2c4f3641a1dcb6f3530fe8b969a96497486cb91030178990a02b89e0750510fd81633839764a5cd3d51044e74d

    • SSDEEP

      24576:3RcPJ1j8oe7vTS9aoEg2orxC5sTg9575MuxAePs8OLkD6prQUEji:SJ8JTS9dDesT6lKQZkrppzEji

    • Hydra

      Android banker and info stealer.

    • Hydra family

    • Hydra payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Reads the contacts stored on the device.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

    • Requests modifying system settings.

MITRE ATT&CK Mobile v15

Tasks