General
-
Target
Play_Store.apk
-
Size
4.2MB
-
Sample
241127-rqptcaxjdt
-
MD5
6966dead3e5307bee1ba7a5ead34a63c
-
SHA1
49117815e82f8e8f5ee979e2db0924ebbb5699b8
-
SHA256
7e7ee5b11fe1ca56f0f8416638964bec68b9ef90b25426f06d1330222b1dcf3d
-
SHA512
693b02d938d2b5bdf7b6085ad87a5eaa3c2134528739a1aab127bc533f4bda3659ef56e7a5261d5d2517b8586ecb3f52668f56ce2d55e8b7d8fbd1ab5c0a8daa
-
SSDEEP
98304:E0VWaHzRXEjLWQo+KuHQPyYYGsMvCuSjgxekJbeBVv:E0VWkzRUfMJkYyYYN+CpKekwVv
Static task
static1
Behavioral task
behavioral1
Sample
Play_Store.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
hydra
http://boynezborisalez.net
Targets
-
-
Target
Play_Store.apk
-
Size
4.2MB
-
MD5
6966dead3e5307bee1ba7a5ead34a63c
-
SHA1
49117815e82f8e8f5ee979e2db0924ebbb5699b8
-
SHA256
7e7ee5b11fe1ca56f0f8416638964bec68b9ef90b25426f06d1330222b1dcf3d
-
SHA512
693b02d938d2b5bdf7b6085ad87a5eaa3c2134528739a1aab127bc533f4bda3659ef56e7a5261d5d2517b8586ecb3f52668f56ce2d55e8b7d8fbd1ab5c0a8daa
-
SSDEEP
98304:E0VWaHzRXEjLWQo+KuHQPyYYGsMvCuSjgxekJbeBVv:E0VWkzRUfMJkYyYYN+CpKekwVv
-
Hydra family
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Reads the contacts stored on the device.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1