Analysis
-
max time kernel
5s -
max time network
68s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
07-11-2024 14:01
Static task
static1
Behavioral task
behavioral1
Sample
319749ae38911de82016214433f84cea75ecab470ca784472378857947c528e8.bin [MConverter.eu].apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
319749ae38911de82016214433f84cea75ecab470ca784472378857947c528e8.bin [MConverter.eu].apk
Resource
android-x64-20240624-en
General
-
Target
319749ae38911de82016214433f84cea75ecab470ca784472378857947c528e8.bin [MConverter.eu].apk
-
Size
1.5MB
-
MD5
413454e07a8e3f7ba94625bfab65f6dd
-
SHA1
138d8a46bce41a1f7c2a85ff65699aeee18a34da
-
SHA256
319749ae38911de82016214433f84cea75ecab470ca784472378857947c528e8
-
SHA512
dea969ca469f519b4e107ae768f5d00905930c8474aee2578b7317ba64b6f7ef2134d00ad155f1dc474aae34c928dede08bdb3c94e1f5a4b5d02c894595793ae
-
SSDEEP
49152:ILvRcaOA6LwHimFfxCxd16VHogQfJUWNezwS4DCEjT:C+aODwHiWxC7BJUWNeeCEjT
Malware Config
Extracted
hydra
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Hydra payload 2 IoCs
resource yara_rule behavioral2/files/fstream-4.dat family_hydra1 behavioral2/files/fstream-4.dat family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /storage/emulated/0/Android/obb/com.grand.snods/dp/classes.dex 4963 com.grand.snods /storage/emulated/0/Android/obb/com.grand.snods/dp/classes.dex 4963 com.grand.snods /storage/emulated/0/Android/obb/com.grand.snods/dp/a.a 4963 com.grand.snods /storage/emulated/0/Android/obb/com.grand.snods/dp/a.a 4963 com.grand.snods -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.grand.snods
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD55cd1cfcd474a2ca77008e5d6330e3cfb
SHA1eedcc4d5f8cda0827ecf5e3345661daf215a8610
SHA2566e6f1da5ca4a2c105c685d8d9fdc4ef6024b933a620eb3585fcfdbc3fcfc100d
SHA512ea30a29839e7e93457c1816e1fdfdfaa924f50da0fe3cc2022bb6f7c04b62eea6bd86a0b92b1a915cdfdb32e30c5b94ad8d3d7cfd8b5b3f8d6452b0cf1f7d90a
-
Filesize
2.2MB
MD5270662fadcf2120ed8ca9fb6e9dab15c
SHA1a020da7f59c839379cc9209b87baa71361274692
SHA25684c42a5f5d72055b40f277097171b782b2cc76d355c99de8b4dd8be1405d1914
SHA512f8eedfbb38c4198cdd3c8dcedd91caed68c2489680d8dce49d1dc858cc0f587b545f02802cdf0739feff215da4dcd27b9a6ecdcbe9a4a2c7a33f8bc38ec274ab
-
Filesize
67KB
MD59b83585ef814920f51d1a9022128aa5e
SHA1f35ed3b3501e89b29c920454ac6a6eccb50fb6b9
SHA256919af9ad41bac5b089efbc37d6e72787826b947d149695ea8ec92ffa9c832ce2
SHA512ade9b2d80a3fd41847e0dfc4528e57bc8cc8aa04a9807faecd16f676815f054a9742c8f462b956d696dfd17b6906481e2c0d3ae13d3d531f33322fa5b880ea04
-
Filesize
1005KB
MD5d31aede1c745ad9d61990f748d558dd2
SHA18b1895a7b7277d4e56ff3df7b9f44535f9ce6eab
SHA256dc73f0cfbe1a63bc32a1bf90c1d7ecddc9e9e49d1fc82010ad42d8eddfe07ae3
SHA512053e821deb4c57cd5c4ab1920b39b1998e36ac57cc4e1b63e69e189121da5ae2ef7d923e030ca65e689a3ab61188fcd7e01c9c3970304c34764379e217e16163
-
Filesize
963KB
MD5ea5dca87fd675a314b4859195199ae7d
SHA1479b6bae6b9f90e7b0a69aeb42998661f736145e
SHA25628b6425ddf936d9c85c665101f8d83d8427e32763cbd8becde84c8aa92229c24
SHA51261ea4d41bc1bd1b531440822f28c97a75f57f093632ca426dac8baf86d0c3e273ef14a020a8a759316d5d6a64ad4d8222a79b3f0e01456d885decf2349a967aa