General
-
Target
bfc7f0f356ba9424c853dbbf07ad74afba77661b611214282e51796ff4e1e7ef.bin
-
Size
2.6MB
-
Sample
241128-1xwd5sslgt
-
MD5
22b072ddcdfed676a88f6e1c265ef367
-
SHA1
7db43ad4ea7d19e4c2a813e61647f2890a467633
-
SHA256
bfc7f0f356ba9424c853dbbf07ad74afba77661b611214282e51796ff4e1e7ef
-
SHA512
9b8d04bc9c4afd5bfd7b0098d96886ab01807f062276511afb01fb8e9c3348fda9e707d1584c8df87b661c591c709229ebff42f693176575444d78f4fb45cda3
-
SSDEEP
49152:onwY+WAG9JOReya25PyhrfDX9WJvh7XiiYVE4RC/14BHFumweEjH:objGReX5tWph7Xdb14BImweEjH
Static task
static1
Behavioral task
behavioral1
Sample
bfc7f0f356ba9424c853dbbf07ad74afba77661b611214282e51796ff4e1e7ef.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bfc7f0f356ba9424c853dbbf07ad74afba77661b611214282e51796ff4e1e7ef.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
bfc7f0f356ba9424c853dbbf07ad74afba77661b611214282e51796ff4e1e7ef.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
hydra
http://fhuiooedjefjheeffemensb.info
Targets
-
-
Target
bfc7f0f356ba9424c853dbbf07ad74afba77661b611214282e51796ff4e1e7ef.bin
-
Size
2.6MB
-
MD5
22b072ddcdfed676a88f6e1c265ef367
-
SHA1
7db43ad4ea7d19e4c2a813e61647f2890a467633
-
SHA256
bfc7f0f356ba9424c853dbbf07ad74afba77661b611214282e51796ff4e1e7ef
-
SHA512
9b8d04bc9c4afd5bfd7b0098d96886ab01807f062276511afb01fb8e9c3348fda9e707d1584c8df87b661c591c709229ebff42f693176575444d78f4fb45cda3
-
SSDEEP
49152:onwY+WAG9JOReya25PyhrfDX9WJvh7XiiYVE4RC/14BHFumweEjH:objGReX5tWph7Xdb14BImweEjH
-
Hydra family
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Reads the contacts stored on the device.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1