Analysis
-
max time kernel
149s -
max time network
150s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
13-11-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
48c78eac456b7434238ddda9df1bfb29b0a2a88d29bc63b5a0225b3c76971f75.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
48c78eac456b7434238ddda9df1bfb29b0a2a88d29bc63b5a0225b3c76971f75.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
48c78eac456b7434238ddda9df1bfb29b0a2a88d29bc63b5a0225b3c76971f75.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
48c78eac456b7434238ddda9df1bfb29b0a2a88d29bc63b5a0225b3c76971f75.apk
-
Size
3.8MB
-
MD5
4d106bb0fcb4d029542ef72751abf95f
-
SHA1
8e169c1b5e16cb422baa24cc48fad139788d5dbe
-
SHA256
48c78eac456b7434238ddda9df1bfb29b0a2a88d29bc63b5a0225b3c76971f75
-
SHA512
a451043f3428214d2a53b849e035367ad8e2b9fe3ca1af75cc2e67ef837b2c67e96ac73e32719d80c5939498751b78e6b88c92c08629ce14cdab1965ef8519f8
-
SSDEEP
98304:oWEj29j+ENNwbLqA5f6VvAt1EjrgJvj3xPhp:68xNNwbLZptRTrp
Malware Config
Extracted
hydra
http://planb34.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Hydra payload 1 IoCs
resource yara_rule behavioral3/files/fstream-2.dat family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.wfmsxjyim.jsgcakpke/app_app_dex/cjgqnnl.guh 4762 com.wfmsxjyim.jsgcakpke /data/user/0/com.wfmsxjyim.jsgcakpke/app_app_dex/cjgqnnl.guh 4762 com.wfmsxjyim.jsgcakpke -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.wfmsxjyim.jsgcakpke Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.wfmsxjyim.jsgcakpke -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.wfmsxjyim.jsgcakpke -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.wfmsxjyim.jsgcakpke -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.wfmsxjyim.jsgcakpke -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.wfmsxjyim.jsgcakpke -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.wfmsxjyim.jsgcakpke -
Reads information about phone network operator. 1 TTPs
Processes
-
com.wfmsxjyim.jsgcakpke1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
PID:4762
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5df896da6e0f3bb4b814f6ee6dbf4a329
SHA12b61c1d5f2ea5c00dc52a14bfd0ba6384e8909cc
SHA256c9409acda3ca0e61b16894f0d1eb941c6fa25cbd4145b5cb2e7ae3e84aa78c13
SHA51280c5f41a39bfd73034b37362b54910d1c8a9386394db46c11e92686e7a20cd03c10d67d98ba6011cdd6a0436914718d5ddfb11623d9850293b10b1c1ba709d5c
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f