General

  • Target

    bfc7f0f356ba9424c853dbbf07ad74afba77661b611214282e51796ff4e1e7ef.bin

  • Size

    2.6MB

  • Sample

    241128-1xwd5sslgt

  • MD5

    22b072ddcdfed676a88f6e1c265ef367

  • SHA1

    7db43ad4ea7d19e4c2a813e61647f2890a467633

  • SHA256

    bfc7f0f356ba9424c853dbbf07ad74afba77661b611214282e51796ff4e1e7ef

  • SHA512

    9b8d04bc9c4afd5bfd7b0098d96886ab01807f062276511afb01fb8e9c3348fda9e707d1584c8df87b661c591c709229ebff42f693176575444d78f4fb45cda3

  • SSDEEP

    49152:onwY+WAG9JOReya25PyhrfDX9WJvh7XiiYVE4RC/14BHFumweEjH:objGReX5tWph7Xdb14BImweEjH

Malware Config

Extracted

Family

hydra

C2

http://fhuiooedjefjheeffemensb.info

Targets

    • Target

      bfc7f0f356ba9424c853dbbf07ad74afba77661b611214282e51796ff4e1e7ef.bin

    • Size

      2.6MB

    • MD5

      22b072ddcdfed676a88f6e1c265ef367

    • SHA1

      7db43ad4ea7d19e4c2a813e61647f2890a467633

    • SHA256

      bfc7f0f356ba9424c853dbbf07ad74afba77661b611214282e51796ff4e1e7ef

    • SHA512

      9b8d04bc9c4afd5bfd7b0098d96886ab01807f062276511afb01fb8e9c3348fda9e707d1584c8df87b661c591c709229ebff42f693176575444d78f4fb45cda3

    • SSDEEP

      49152:onwY+WAG9JOReya25PyhrfDX9WJvh7XiiYVE4RC/14BHFumweEjH:objGReX5tWph7Xdb14BImweEjH

    • Hydra

      Android banker and info stealer.

    • Hydra family

    • Hydra payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Reads the contacts stored on the device.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks