Analysis

  • max time kernel
    5s
  • max time network
    68s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    07-11-2024 14:01

General

  • Target

    319749ae38911de82016214433f84cea75ecab470ca784472378857947c528e8.bin [MConverter.eu].apk

  • Size

    1.5MB

  • MD5

    413454e07a8e3f7ba94625bfab65f6dd

  • SHA1

    138d8a46bce41a1f7c2a85ff65699aeee18a34da

  • SHA256

    319749ae38911de82016214433f84cea75ecab470ca784472378857947c528e8

  • SHA512

    dea969ca469f519b4e107ae768f5d00905930c8474aee2578b7317ba64b6f7ef2134d00ad155f1dc474aae34c928dede08bdb3c94e1f5a4b5d02c894595793ae

  • SSDEEP

    49152:ILvRcaOA6LwHimFfxCxd16VHogQfJUWNezwS4DCEjT:C+aODwHiWxC7BJUWNeeCEjT

Malware Config

Extracted

Family

hydra

AES_key

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra family
  • Hydra payload 2 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.grand.snods
    1⤵
    • Loads dropped Dex/Jar
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4963

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.grand.snods/files/libdexload_x86.so

    Filesize

    297KB

    MD5

    5cd1cfcd474a2ca77008e5d6330e3cfb

    SHA1

    eedcc4d5f8cda0827ecf5e3345661daf215a8610

    SHA256

    6e6f1da5ca4a2c105c685d8d9fdc4ef6024b933a620eb3585fcfdbc3fcfc100d

    SHA512

    ea30a29839e7e93457c1816e1fdfdfaa924f50da0fe3cc2022bb6f7c04b62eea6bd86a0b92b1a915cdfdb32e30c5b94ad8d3d7cfd8b5b3f8d6452b0cf1f7d90a

  • /storage/emulated/0/Android/obb/com.grand.snods/dp/a.a

    Filesize

    2.2MB

    MD5

    270662fadcf2120ed8ca9fb6e9dab15c

    SHA1

    a020da7f59c839379cc9209b87baa71361274692

    SHA256

    84c42a5f5d72055b40f277097171b782b2cc76d355c99de8b4dd8be1405d1914

    SHA512

    f8eedfbb38c4198cdd3c8dcedd91caed68c2489680d8dce49d1dc858cc0f587b545f02802cdf0739feff215da4dcd27b9a6ecdcbe9a4a2c7a33f8bc38ec274ab

  • /storage/emulated/0/Android/obb/com.grand.snods/dp/classes.dex

    Filesize

    67KB

    MD5

    9b83585ef814920f51d1a9022128aa5e

    SHA1

    f35ed3b3501e89b29c920454ac6a6eccb50fb6b9

    SHA256

    919af9ad41bac5b089efbc37d6e72787826b947d149695ea8ec92ffa9c832ce2

    SHA512

    ade9b2d80a3fd41847e0dfc4528e57bc8cc8aa04a9807faecd16f676815f054a9742c8f462b956d696dfd17b6906481e2c0d3ae13d3d531f33322fa5b880ea04

  • /storage/emulated/0/Android/obb/com.grand.snods/dp/classes2.dex

    Filesize

    1005KB

    MD5

    d31aede1c745ad9d61990f748d558dd2

    SHA1

    8b1895a7b7277d4e56ff3df7b9f44535f9ce6eab

    SHA256

    dc73f0cfbe1a63bc32a1bf90c1d7ecddc9e9e49d1fc82010ad42d8eddfe07ae3

    SHA512

    053e821deb4c57cd5c4ab1920b39b1998e36ac57cc4e1b63e69e189121da5ae2ef7d923e030ca65e689a3ab61188fcd7e01c9c3970304c34764379e217e16163

  • /storage/emulated/0/Android/obb/com.grand.snods/dp/monay

    Filesize

    963KB

    MD5

    ea5dca87fd675a314b4859195199ae7d

    SHA1

    479b6bae6b9f90e7b0a69aeb42998661f736145e

    SHA256

    28b6425ddf936d9c85c665101f8d83d8427e32763cbd8becde84c8aa92229c24

    SHA512

    61ea4d41bc1bd1b531440822f28c97a75f57f093632ca426dac8baf86d0c3e273ef14a020a8a759316d5d6a64ad4d8222a79b3f0e01456d885decf2349a967aa