General

  • Target

    0d0d156f5634762f031711fc868181df736843c42f057ee728e7c82bf04f0cde.bin [MConverter.eu].apk

  • Size

    3.7MB

  • Sample

    241107-qe6r2ssgma

  • MD5

    a3cd10e11f6188244488d93b6777e7c3

  • SHA1

    418b6432f823868b33bccdf641267f5d6a8497d1

  • SHA256

    0d0d156f5634762f031711fc868181df736843c42f057ee728e7c82bf04f0cde

  • SHA512

    fa7b52c2d9a4517d379be57912182d2ac5033cb2009eae90a3a3bd1de1788f41bfa74705f77a0d2b31198610aeb1505db9112860491ccc3dfe78968d3a906611

  • SSDEEP

    98304:uI+vBBTxBNTEjp5SoVSqZEmSKsq/ZgCke+fakXDRTbc:p+vB1xBK+olVSyqNf9zRTbc

Malware Config

Extracted

Family

hydra

C2

http://tahrakamezlokez.net

Targets

    • Target

      0d0d156f5634762f031711fc868181df736843c42f057ee728e7c82bf04f0cde.bin [MConverter.eu].apk

    • Size

      3.7MB

    • MD5

      a3cd10e11f6188244488d93b6777e7c3

    • SHA1

      418b6432f823868b33bccdf641267f5d6a8497d1

    • SHA256

      0d0d156f5634762f031711fc868181df736843c42f057ee728e7c82bf04f0cde

    • SHA512

      fa7b52c2d9a4517d379be57912182d2ac5033cb2009eae90a3a3bd1de1788f41bfa74705f77a0d2b31198610aeb1505db9112860491ccc3dfe78968d3a906611

    • SSDEEP

      98304:uI+vBBTxBNTEjp5SoVSqZEmSKsq/ZgCke+fakXDRTbc:p+vB1xBK+olVSyqNf9zRTbc

    • Hydra

      Android banker and info stealer.

    • Hydra family

    • Hydra payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Reads the contacts stored on the device.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

    • Requests modifying system settings.

MITRE ATT&CK Mobile v15

Tasks