Analysis

  • max time kernel
    2s
  • max time network
    150s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    31/12/2024, 22:02

General

  • Target

    b74ff906b2d2b3fece254bcdbf1936894f2196eb447d6c83c380f281354d2a85.apk

  • Size

    1.5MB

  • MD5

    818d49b568784a0caecdb174d461d38d

  • SHA1

    96a638e8b4b11a41d5b32e2a1026b39323eab6ad

  • SHA256

    b74ff906b2d2b3fece254bcdbf1936894f2196eb447d6c83c380f281354d2a85

  • SHA512

    a7ed45a862cefef4be41d8e4d6a614e243826a702f6aac04d2c00d99a9d6b193f6dbb0cc4b7f5ed42c5a4abc10d2e695f3e3817ff24f79e7c6d930fd040750ec

  • SSDEEP

    49152:dGvRcaUfqKKeIw5cC6GiXgHTVgJ4FVQmfGYczwS4ovrEjY:O+aUqeIw5XgWSJ4FV2YczEjY

Malware Config

Extracted

Family

hydra

AES_key

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra family
  • Hydra payload 2 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.grand.ftx
    1⤵
    • Loads dropped Dex/Jar
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:5230

Network

        MITRE ATT&CK Mobile v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /data/data/com.grand.ftx/files/libdexload_x86.so

          Filesize

          297KB

          MD5

          5cd1cfcd474a2ca77008e5d6330e3cfb

          SHA1

          eedcc4d5f8cda0827ecf5e3345661daf215a8610

          SHA256

          6e6f1da5ca4a2c105c685d8d9fdc4ef6024b933a620eb3585fcfdbc3fcfc100d

          SHA512

          ea30a29839e7e93457c1816e1fdfdfaa924f50da0fe3cc2022bb6f7c04b62eea6bd86a0b92b1a915cdfdb32e30c5b94ad8d3d7cfd8b5b3f8d6452b0cf1f7d90a

        • /storage/emulated/0/Android/obb/com.grand.ftx/dp/a.a

          Filesize

          2.2MB

          MD5

          e9ef45109360c3deb5ba1be878fc80dd

          SHA1

          c40a8d97f9b1f3c8f73fe64bc441b0aeb6e289ee

          SHA256

          826678b2c342d10e1f37f1fa4bef1a23f2a5e333a134eb9ee28bd87c4fcd622a

          SHA512

          704b120d7224780b4de3e61bcc7398a9f73ff268233d5a86129741ff83187b5ba1825f4a86408a2ef6455cbbd5c0f33aee7484bc9c3528a3a6ea9a203f54905c

        • /storage/emulated/0/Android/obb/com.grand.ftx/dp/classes.dex

          Filesize

          68KB

          MD5

          96b05aa0c7699b30448a7d08cf119e17

          SHA1

          d093a32e7e486b4dbadf9fc874a5ca01dcc0db46

          SHA256

          868bc5a001941bf163c9221272b79c7e7d8405533e7f892a3fbba30ac63bf65f

          SHA512

          0b262c31d4aa2e5d83c0fa6fcabf46aeaf93d3f2792450f0ff3acca5dc0634d61d5b80925b22ae08bd473e09c6b69336aa7e53013093b056af4c396606a04866

        • /storage/emulated/0/Android/obb/com.grand.ftx/dp/classes2.dex

          Filesize

          1005KB

          MD5

          86a47e2193f808ae35d3addc8bcda134

          SHA1

          c2562c5d5173db00d0da923ee9bef22fdf6c7507

          SHA256

          732d77234b993d087c81fddf8c5da66703bbb67d00227100b39d12709d5dbfb0

          SHA512

          7a0f0e9f443c054983a15c359b303591a564799ac7616ca1ccbf3aeefeb78104aeb2409d64e984dfea0bda97a97d27aa25ca2f59e8719917d8e1245d91476a1e

        • /storage/emulated/0/Android/obb/com.grand.ftx/dp/monay

          Filesize

          963KB

          MD5

          973f67c62dd08ab6baff8b0db3d56c16

          SHA1

          ff4e61ca69c730f9aad76a9646014f63ce81ee60

          SHA256

          9de6fa05cd33d5681d53ab9558ab8b697d1c4b13017b29b3e8f3aafbed9bfcd3

          SHA512

          dfa5dc918d7700cae4ed463a83a022a91df5b55e6784e21c3649ea7b52fe6a1ecedc48a34871e3525c300c23707df63f19792dc8518dfd31b25ce02981e73196