Analysis
-
max time kernel
149s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
13-11-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
48c78eac456b7434238ddda9df1bfb29b0a2a88d29bc63b5a0225b3c76971f75.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
48c78eac456b7434238ddda9df1bfb29b0a2a88d29bc63b5a0225b3c76971f75.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
48c78eac456b7434238ddda9df1bfb29b0a2a88d29bc63b5a0225b3c76971f75.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
48c78eac456b7434238ddda9df1bfb29b0a2a88d29bc63b5a0225b3c76971f75.apk
-
Size
3.8MB
-
MD5
4d106bb0fcb4d029542ef72751abf95f
-
SHA1
8e169c1b5e16cb422baa24cc48fad139788d5dbe
-
SHA256
48c78eac456b7434238ddda9df1bfb29b0a2a88d29bc63b5a0225b3c76971f75
-
SHA512
a451043f3428214d2a53b849e035367ad8e2b9fe3ca1af75cc2e67ef837b2c67e96ac73e32719d80c5939498751b78e6b88c92c08629ce14cdab1965ef8519f8
-
SSDEEP
98304:oWEj29j+ENNwbLqA5f6VvAt1EjrgJvj3xPhp:68xNNwbLZptRTrp
Malware Config
Extracted
hydra
http://planb34.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Hydra payload 2 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_hydra2 behavioral1/memory/4316-1.dex family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.wfmsxjyim.jsgcakpke/app_app_dex/cjgqnnl.guh 4316 com.wfmsxjyim.jsgcakpke /data/user/0/com.wfmsxjyim.jsgcakpke/app_app_dex/cjgqnnl.guh 4344 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.wfmsxjyim.jsgcakpke/app_app_dex/cjgqnnl.guh --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.wfmsxjyim.jsgcakpke/app_app_dex/oat/x86/cjgqnnl.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.wfmsxjyim.jsgcakpke/app_app_dex/cjgqnnl.guh 4316 com.wfmsxjyim.jsgcakpke -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.wfmsxjyim.jsgcakpke Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.wfmsxjyim.jsgcakpke -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.wfmsxjyim.jsgcakpke -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.wfmsxjyim.jsgcakpke -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.wfmsxjyim.jsgcakpke -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.wfmsxjyim.jsgcakpke -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.wfmsxjyim.jsgcakpke -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.wfmsxjyim.jsgcakpke
Processes
-
com.wfmsxjyim.jsgcakpke1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4316 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.wfmsxjyim.jsgcakpke/app_app_dex/cjgqnnl.guh --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.wfmsxjyim.jsgcakpke/app_app_dex/oat/x86/cjgqnnl.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4344
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5df896da6e0f3bb4b814f6ee6dbf4a329
SHA12b61c1d5f2ea5c00dc52a14bfd0ba6384e8909cc
SHA256c9409acda3ca0e61b16894f0d1eb941c6fa25cbd4145b5cb2e7ae3e84aa78c13
SHA51280c5f41a39bfd73034b37362b54910d1c8a9386394db46c11e92686e7a20cd03c10d67d98ba6011cdd6a0436914718d5ddfb11623d9850293b10b1c1ba709d5c
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f
-
Filesize
2.7MB
MD5db158b82e7abd8479125e8a787fd0fa9
SHA1b1ca8bfd456c1821ec92598301d70192b2f893d2
SHA2569d8bdaeb9e461a250c89af5c23d13c7eda780303e72a2e26303db898e8d3cb02
SHA512d4f2272d238777a9b6e8ed6c9f3a8f2bb39669f8a3a6de4872f3f8aa21d7fa79070a92c8b1ef306f5fc451e16c8ec474fa7437a6fc7038681ddf3c8ed0fecb3d