General

  • Target

    f5bbba0e4961af38c7a89ff2af505c878f5cc8fa65a2fe93e9b8f8b437a96997.bin

  • Size

    2.9MB

  • Sample

    241127-1ygblssnb1

  • MD5

    22e5ff6d7ca46c53247bcb13329f76ae

  • SHA1

    d655b2d0f1ab786d098ccf8f5fc44acab358fbe8

  • SHA256

    f5bbba0e4961af38c7a89ff2af505c878f5cc8fa65a2fe93e9b8f8b437a96997

  • SHA512

    b5a40d7a508a0d376506b7373ee5c35b6d7c4d7df33c05c69d38465c9e949d39021e538d16335dfb7efcd5af6cf01741a88e1cd2eea75d6a683b25a2caba8fb1

  • SSDEEP

    49152:Qg94TTRGh4c0C4XOuxdutMZNgDwYtPBvRrXyoc8Z5qgzem+WtmU7d/KDv+:kcANxdutMBmPB5Co5Z5AmbtFd/6+

Malware Config

Extracted

Family

hydra

C2

http://alinozecorkiyez.com

Targets

    • Target

      f5bbba0e4961af38c7a89ff2af505c878f5cc8fa65a2fe93e9b8f8b437a96997.bin

    • Size

      2.9MB

    • MD5

      22e5ff6d7ca46c53247bcb13329f76ae

    • SHA1

      d655b2d0f1ab786d098ccf8f5fc44acab358fbe8

    • SHA256

      f5bbba0e4961af38c7a89ff2af505c878f5cc8fa65a2fe93e9b8f8b437a96997

    • SHA512

      b5a40d7a508a0d376506b7373ee5c35b6d7c4d7df33c05c69d38465c9e949d39021e538d16335dfb7efcd5af6cf01741a88e1cd2eea75d6a683b25a2caba8fb1

    • SSDEEP

      49152:Qg94TTRGh4c0C4XOuxdutMZNgDwYtPBvRrXyoc8Z5qgzem+WtmU7d/KDv+:kcANxdutMBmPB5Co5Z5AmbtFd/6+

    • Hydra

      Android banker and info stealer.

    • Hydra family

    • Hydra payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Reads the contacts stored on the device.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks