Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    05-12-2024 22:03

General

  • Target

    83fe65fe0364b51e440e84d2ce4ecff8fefb7ff6f923e187e296da7b2f3674da.apk

  • Size

    3.3MB

  • MD5

    e6a82f097295699f542e5eb3d9eea835

  • SHA1

    e157688ce2a6bd7cd01dacea5e63271844ae2348

  • SHA256

    83fe65fe0364b51e440e84d2ce4ecff8fefb7ff6f923e187e296da7b2f3674da

  • SHA512

    be0e6a4cb0077f38d48610f2ffd4c2eaebe068cb66894c076790dff6d28e1418ce53673652084dcabd4d9deece965756a9c2da978aed833bd74ca8b0a5f52e08

  • SSDEEP

    98304:sldd9Mci2YsDV3WKPc86efqtryDYH1DK+M9xhf4w:sl6ci2pDV397

Malware Config

Extracted

Family

hydra

C2

http://yinedegelde.cfd

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra family
  • Hydra payload 4 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Reads the contacts stored on the device. 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs

Processes

  • com.version.injury
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Reads the contacts stored on the device.
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    PID:4329
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.version.injury/app_tenant/iD.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.version.injury/app_tenant/oat/x86/iD.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4354

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.version.injury/app_tenant/iD.json

    Filesize

    967KB

    MD5

    20e89fffd6e59b46c37ed6445be18e7b

    SHA1

    fd2235cf49aa56ec93e4a830511f1b5e3e3f3f44

    SHA256

    f666d771ba87bec2d19fe2e9e6f5c291cdb892d1fcb3da326b66ec58f299aa46

    SHA512

    1b4f244a0bf1a45a10f0c2044b92bcdb36ff63c0e9f806dc68db7f1812034da6db50df428c382e1c9366b68fd4f61f6629e5ef15af64d66f5221f873c5975fee

  • /data/data/com.version.injury/app_tenant/iD.json

    Filesize

    967KB

    MD5

    cb6e8b93ee089be8b86efff7311bdbed

    SHA1

    c2949d8bc9d3900d9f9daae303b96b2d630148eb

    SHA256

    33d78d802a0915f32dd0a0e709cdff7e901f34e0bbe6e674d78850e3429192bb

    SHA512

    de1a95d68936f1239e9a35ba424446799f37a32cd6a5bd6654f1e94235fcd065d066d0330790c894e9c32b043e29b1f66feb0c3af260d77726fef8d41e2df633

  • /data/data/com.version.injury/app_tenant/oat/iD.json.cur.prof

    Filesize

    1KB

    MD5

    514753a1a86ca3b4e803ad786edd68a5

    SHA1

    f3a762cc5d4145382d3e81ec7562168e809f78d6

    SHA256

    601d793d880ca8af9496b54f6aa20502913a3359123dacde852d79bbc9ff69a6

    SHA512

    379b495bedf05281f7bf7bd6f0be7500f4faf43a5118892b1fad0edd6f4fb2a2a318caaa6ce39868592c79909bd2e46349e6baff0da728d35fd96b030ff5073b

  • /data/user/0/com.version.injury/app_tenant/iD.json

    Filesize

    2.2MB

    MD5

    d62c8da2e6f01f002a1974841f619cd3

    SHA1

    e9d27a01e1e0c9b025c59b2b58b10bbf477d5b89

    SHA256

    8a4cb5724b2ad55bc6772063a9580bd10f1d9fe5c02a250c2c0cfbb6aa368132

    SHA512

    1892b0d97d20811b0d323391d147fbe6dd239fd4d9d93d70deaf5c024d5d8515fcb5a69270bd31aa669b880c374a9450ff9d37e9b60a947a955bad97cd2e13cf

  • /data/user/0/com.version.injury/app_tenant/iD.json

    Filesize

    2.2MB

    MD5

    4034e1f8aa89126b0c0e6cfc12404484

    SHA1

    e0367e78f3845bf73937059965a7660a6bd25355

    SHA256

    1bafaecde9d220ef902aa4459eda70446896a596c0d5e597161de090ec81b461

    SHA512

    a9ac2481dc9d11a7506c6267b62b3aaaf13a80bb3a78da976bf0c24683492caea1a94d5f27ce323bdd0f6ec3898b5050ced99d1f17d8f055eb69039b7ef1c7a2