Analysis
-
max time kernel
148s -
max time network
149s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
07-11-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
0d0d156f5634762f031711fc868181df736843c42f057ee728e7c82bf04f0cde.bin [MConverter.eu].apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0d0d156f5634762f031711fc868181df736843c42f057ee728e7c82bf04f0cde.bin [MConverter.eu].apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
0d0d156f5634762f031711fc868181df736843c42f057ee728e7c82bf04f0cde.bin [MConverter.eu].apk
Resource
android-x64-arm64-20240624-en
General
-
Target
0d0d156f5634762f031711fc868181df736843c42f057ee728e7c82bf04f0cde.bin [MConverter.eu].apk
-
Size
3.7MB
-
MD5
a3cd10e11f6188244488d93b6777e7c3
-
SHA1
418b6432f823868b33bccdf641267f5d6a8497d1
-
SHA256
0d0d156f5634762f031711fc868181df736843c42f057ee728e7c82bf04f0cde
-
SHA512
fa7b52c2d9a4517d379be57912182d2ac5033cb2009eae90a3a3bd1de1788f41bfa74705f77a0d2b31198610aeb1505db9112860491ccc3dfe78968d3a906611
-
SSDEEP
98304:uI+vBBTxBNTEjp5SoVSqZEmSKsq/ZgCke+fakXDRTbc:p+vB1xBK+olVSyqNf9zRTbc
Malware Config
Extracted
hydra
http://tahrakamezlokez.net
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Hydra payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.aiynakeuf.qubtahrys/app_app_dex/cipnmuu.kqs family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.aiynakeuf.qubtahrysioc pid process /data/user/0/com.aiynakeuf.qubtahrys/app_app_dex/cipnmuu.kqs 4514 com.aiynakeuf.qubtahrys /data/user/0/com.aiynakeuf.qubtahrys/app_app_dex/cipnmuu.kqs 4514 com.aiynakeuf.qubtahrys -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.aiynakeuf.qubtahrysdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.aiynakeuf.qubtahrys Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.aiynakeuf.qubtahrys -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
Processes:
com.aiynakeuf.qubtahrysdescription ioc process URI accessed for read content://com.android.contacts/contacts com.aiynakeuf.qubtahrys -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 26 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.aiynakeuf.qubtahrysdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.aiynakeuf.qubtahrys -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.aiynakeuf.qubtahrysioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.aiynakeuf.qubtahrys -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.aiynakeuf.qubtahrysdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.aiynakeuf.qubtahrys -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.aiynakeuf.qubtahrysdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.aiynakeuf.qubtahrys -
Reads information about phone network operator. 1 TTPs
Processes
-
com.aiynakeuf.qubtahrys1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
PID:4514
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ead75b1a695e38e1045b773cc215867f
SHA1260c1a1da0aff308478eaf3cb16e60f9f47a53c5
SHA2563c9731c5854d0c1cab47e0cbc4811d70c0cf74a7153c23e07c4984ce82d4a171
SHA51297fde7046f5fde6c8daabbc8f9948a18263d9041504eb76c30c0b6686cfac3c7a0f62f41919d7f7aebe989ecd1f02f1f25515d5a545c03b1e8c0ed105e7755f7
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f