Analysis
-
max time kernel
65s -
max time network
75s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
11-12-2024 15:33
Static task
static1
Behavioral task
behavioral1
Sample
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990.bin [MConverter.eu].apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990.bin [MConverter.eu].apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990.bin [MConverter.eu].apk
Resource
android-x64-arm64-20240624-en
General
-
Target
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990.bin [MConverter.eu].apk
-
Size
4.9MB
-
MD5
c9db7b7c68e3f4b3ea7bc6d2db7e6c67
-
SHA1
21f29a3bdafe66b9d9a4a0900f87ae0378c2af4e
-
SHA256
a8e7c5ada0ad61b47187241ff1be82212a3f1260087d4276f22658ed66a07990
-
SHA512
d1b4e39dc0b7d39465d64f3fb774fbfe8442ff66d52f2380cf550d2e82838cda33e5dbd6d4a443db964746da309ce3add0d9db884adb2848028f641cd65cbe11
-
SSDEEP
98304:Ftpb68BpwSSih42NbdUGDIJ9wWATD6V7sq/2wsA2OC6OKQv:75TBgih4IbDIXwWk6VYi2dP
Malware Config
Extracted
hydra
http://cabmeldtpgabrilokez.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Hydra payload 2 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_hydra2 behavioral1/memory/4252-1.dex family_hydra2 -
pid Process 4252 com.vpdmkbfdr.hclrvjtqr -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/classes.dex 4252 com.vpdmkbfdr.hclrvjtqr /data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/classes.dex 4325 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/classes.dex 4252 com.vpdmkbfdr.hclrvjtqr -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.vpdmkbfdr.hclrvjtqr Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.vpdmkbfdr.hclrvjtqr Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.vpdmkbfdr.hclrvjtqr -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.vpdmkbfdr.hclrvjtqr -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.vpdmkbfdr.hclrvjtqr -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.vpdmkbfdr.hclrvjtqr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.vpdmkbfdr.hclrvjtqr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.vpdmkbfdr.hclrvjtqr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.vpdmkbfdr.hclrvjtqr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.vpdmkbfdr.hclrvjtqr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.vpdmkbfdr.hclrvjtqr -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.vpdmkbfdr.hclrvjtqr -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.vpdmkbfdr.hclrvjtqr -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.vpdmkbfdr.hclrvjtqr -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.vpdmkbfdr.hclrvjtqr -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.vpdmkbfdr.hclrvjtqr -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.vpdmkbfdr.hclrvjtqr
Processes
-
com.vpdmkbfdr.hclrvjtqr1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4252 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.vpdmkbfdr.hclrvjtqr/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4325
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD59fcebe6ac01f9abcb9358ef3e1be01f8
SHA10c99f46ce1bfa1cfa76a0e30d27c822029db1659
SHA256ab056d7cd8db1977da982d9a2dd8258015120e3cb3ced1abf105ca6e36d724b9
SHA512192c075908f5c18acec27d8b7dd62220727213309764eca391c2d4b558b34cb76eae09ad8aacefe9d9ac46603fe220e685d55e587260881c0247fe6def6ef8c3
-
Filesize
1.3MB
MD5198e249fc4cb7eebfb3aa41c9bca936b
SHA162739a33b597f5f817868c31d76189c34f2a8ce9
SHA2568ff952de0092bbdbd15695e7c6f9b5137015c71f0762edc89417f4cc9d67108a
SHA512cc1b1d9fc44daacb892900b2b17b93db8cb4880e705530d3aeb444b3c7fcda6a4a59266a4c5d56266942b0568bc09ae08f7572c74f8272a3030d210c4b36b6f8
-
Filesize
1.3MB
MD5fdae72c7dd1658f5582bb244648dcc72
SHA156eb6eb1252e0dc7eda9784c49b81e0a00f6d920
SHA256831d26600070e587aca3567bae1a092e77808aecdb6c3ada2d6e3a00d2dd04a1
SHA5125cef1ab17b14497b6a7f4beb1cd8fb424c7962b845597bc833395c49bc79b32d4fd49b862767dab29efdc660ae39e1a99f5b8e1157e1430ae5d312ebb20ca95e
-
Filesize
2.7MB
MD58d90b856e648ae046910a729444c6cd9
SHA1593447bc893698a35223865bf9268249a2d91494
SHA256c1fe39803df5d3d049fa284e81391cd3e6439f796da7d1d7528b54889e8eb5b5
SHA512cbf78421424c442a88726be1a5691ed482ad5f4841156d6b2986399c709d3d7e35a252662273b239db3d7940c4dbe479a29e02c2c3d6af127b98e556759ab963