Resubmissions

27-11-2024 14:27

241127-rshstaxkbv 10

27-11-2024 14:25

241127-rrrz4atlbr 10

27-11-2024 14:24

241127-rqptcaxjdt 10

27-11-2024 14:07

241127-rfaaxasqgk 10

31-12-2023 17:07

231231-vmy5dsbbar 1

General

  • Target

    Play_Store.apk

  • Size

    4.2MB

  • Sample

    241127-rqptcaxjdt

  • MD5

    6966dead3e5307bee1ba7a5ead34a63c

  • SHA1

    49117815e82f8e8f5ee979e2db0924ebbb5699b8

  • SHA256

    7e7ee5b11fe1ca56f0f8416638964bec68b9ef90b25426f06d1330222b1dcf3d

  • SHA512

    693b02d938d2b5bdf7b6085ad87a5eaa3c2134528739a1aab127bc533f4bda3659ef56e7a5261d5d2517b8586ecb3f52668f56ce2d55e8b7d8fbd1ab5c0a8daa

  • SSDEEP

    98304:E0VWaHzRXEjLWQo+KuHQPyYYGsMvCuSjgxekJbeBVv:E0VWkzRUfMJkYyYYN+CpKekwVv

Malware Config

Extracted

Family

hydra

C2

http://boynezborisalez.net

Targets

    • Target

      Play_Store.apk

    • Size

      4.2MB

    • MD5

      6966dead3e5307bee1ba7a5ead34a63c

    • SHA1

      49117815e82f8e8f5ee979e2db0924ebbb5699b8

    • SHA256

      7e7ee5b11fe1ca56f0f8416638964bec68b9ef90b25426f06d1330222b1dcf3d

    • SHA512

      693b02d938d2b5bdf7b6085ad87a5eaa3c2134528739a1aab127bc533f4bda3659ef56e7a5261d5d2517b8586ecb3f52668f56ce2d55e8b7d8fbd1ab5c0a8daa

    • SSDEEP

      98304:E0VWaHzRXEjLWQo+KuHQPyYYGsMvCuSjgxekJbeBVv:E0VWkzRUfMJkYyYYN+CpKekwVv

    • Hydra

      Android banker and info stealer.

    • Hydra family

    • Hydra payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Reads the contacts stored on the device.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks