Analysis
-
max time kernel
146s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
07-11-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
0d0d156f5634762f031711fc868181df736843c42f057ee728e7c82bf04f0cde.bin [MConverter.eu].apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0d0d156f5634762f031711fc868181df736843c42f057ee728e7c82bf04f0cde.bin [MConverter.eu].apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
0d0d156f5634762f031711fc868181df736843c42f057ee728e7c82bf04f0cde.bin [MConverter.eu].apk
Resource
android-x64-arm64-20240624-en
General
-
Target
0d0d156f5634762f031711fc868181df736843c42f057ee728e7c82bf04f0cde.bin [MConverter.eu].apk
-
Size
3.7MB
-
MD5
a3cd10e11f6188244488d93b6777e7c3
-
SHA1
418b6432f823868b33bccdf641267f5d6a8497d1
-
SHA256
0d0d156f5634762f031711fc868181df736843c42f057ee728e7c82bf04f0cde
-
SHA512
fa7b52c2d9a4517d379be57912182d2ac5033cb2009eae90a3a3bd1de1788f41bfa74705f77a0d2b31198610aeb1505db9112860491ccc3dfe78968d3a906611
-
SSDEEP
98304:uI+vBBTxBNTEjp5SoVSqZEmSKsq/ZgCke+fakXDRTbc:p+vB1xBK+olVSyqNf9zRTbc
Malware Config
Extracted
hydra
http://tahrakamezlokez.net
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Hydra payload 2 IoCs
Processes:
resource yara_rule /data/data/com.aiynakeuf.qubtahrys/app_app_dex/cipnmuu.kqs family_hydra2 /data/user/0/com.aiynakeuf.qubtahrys/app_app_dex/cipnmuu.kqs family_hydra2 -
Processes:
com.aiynakeuf.qubtahryspid process 4322 com.aiynakeuf.qubtahrys -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.aiynakeuf.qubtahrys/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.aiynakeuf.qubtahrys/app_app_dex/cipnmuu.kqs --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.aiynakeuf.qubtahrys/app_app_dex/oat/x86/cipnmuu.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/com.aiynakeuf.qubtahrys/app_app_dex/cipnmuu.kqs 4322 com.aiynakeuf.qubtahrys /data/user/0/com.aiynakeuf.qubtahrys/app_app_dex/cipnmuu.kqs 4349 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.aiynakeuf.qubtahrys/app_app_dex/cipnmuu.kqs --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.aiynakeuf.qubtahrys/app_app_dex/oat/x86/cipnmuu.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.aiynakeuf.qubtahrys/app_app_dex/cipnmuu.kqs 4322 com.aiynakeuf.qubtahrys -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.aiynakeuf.qubtahrysdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.aiynakeuf.qubtahrys Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.aiynakeuf.qubtahrys Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.aiynakeuf.qubtahrys -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
Processes:
com.aiynakeuf.qubtahrysdescription ioc process URI accessed for read content://com.android.contacts/contacts com.aiynakeuf.qubtahrys -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 10 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.aiynakeuf.qubtahrysdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.aiynakeuf.qubtahrys -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.aiynakeuf.qubtahrysioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.aiynakeuf.qubtahrys android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.aiynakeuf.qubtahrys android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.aiynakeuf.qubtahrys android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.aiynakeuf.qubtahrys android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.aiynakeuf.qubtahrys -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.aiynakeuf.qubtahrysdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.aiynakeuf.qubtahrys -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.aiynakeuf.qubtahrysdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.aiynakeuf.qubtahrys -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
Processes:
com.aiynakeuf.qubtahrysdescription ioc process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.aiynakeuf.qubtahrys -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.aiynakeuf.qubtahrysdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.aiynakeuf.qubtahrys -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.aiynakeuf.qubtahrysdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.aiynakeuf.qubtahrys -
Requests modifying system settings. 1 IoCs
Processes:
com.aiynakeuf.qubtahrysdescription ioc process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.aiynakeuf.qubtahrys -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.aiynakeuf.qubtahrysdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.aiynakeuf.qubtahrys
Processes
-
com.aiynakeuf.qubtahrys1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Requests modifying system settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4322 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.aiynakeuf.qubtahrys/app_app_dex/cipnmuu.kqs --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.aiynakeuf.qubtahrys/app_app_dex/oat/x86/cipnmuu.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4349
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ead75b1a695e38e1045b773cc215867f
SHA1260c1a1da0aff308478eaf3cb16e60f9f47a53c5
SHA2563c9731c5854d0c1cab47e0cbc4811d70c0cf74a7153c23e07c4984ce82d4a171
SHA51297fde7046f5fde6c8daabbc8f9948a18263d9041504eb76c30c0b6686cfac3c7a0f62f41919d7f7aebe989ecd1f02f1f25515d5a545c03b1e8c0ed105e7755f7
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f
-
Filesize
2.7MB
MD538b5beff5a11973f09c1f5b7cd0bc250
SHA1e4768695705f025cb7bddc73a276a738bca47eb0
SHA256c68e6ddf0144de8446dd070279bbeaff881afb984163b67555f256c08fb20d6c
SHA51220c3d1b99e58e9800413fc7abac2d5831fb9293add3fc12ffe93e82adc8ca5893cf84509564cf1a47aee43cb98c6d2a588a89fc68dacd5a2f531ac54a21c5bf2