Analysis
-
max time kernel
2s -
max time network
150s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
31/12/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
b74ff906b2d2b3fece254bcdbf1936894f2196eb447d6c83c380f281354d2a85.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
b74ff906b2d2b3fece254bcdbf1936894f2196eb447d6c83c380f281354d2a85.apk
Resource
android-x64-20240910-en
General
-
Target
b74ff906b2d2b3fece254bcdbf1936894f2196eb447d6c83c380f281354d2a85.apk
-
Size
1.5MB
-
MD5
818d49b568784a0caecdb174d461d38d
-
SHA1
96a638e8b4b11a41d5b32e2a1026b39323eab6ad
-
SHA256
b74ff906b2d2b3fece254bcdbf1936894f2196eb447d6c83c380f281354d2a85
-
SHA512
a7ed45a862cefef4be41d8e4d6a614e243826a702f6aac04d2c00d99a9d6b193f6dbb0cc4b7f5ed42c5a4abc10d2e695f3e3817ff24f79e7c6d930fd040750ec
-
SSDEEP
49152:dGvRcaUfqKKeIw5cC6GiXgHTVgJ4FVQmfGYczwS4ovrEjY:O+aUqeIw5XgWSJ4FV2YczEjY
Malware Config
Extracted
hydra
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Hydra payload 2 IoCs
resource yara_rule behavioral2/files/fstream-4.dat family_hydra1 behavioral2/files/fstream-4.dat family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /storage/emulated/0/Android/obb/com.grand.ftx/dp/classes.dex 5230 com.grand.ftx /storage/emulated/0/Android/obb/com.grand.ftx/dp/classes.dex 5230 com.grand.ftx /storage/emulated/0/Android/obb/com.grand.ftx/dp/a.a 5230 com.grand.ftx /storage/emulated/0/Android/obb/com.grand.ftx/dp/a.a 5230 com.grand.ftx -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.grand.ftx
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD55cd1cfcd474a2ca77008e5d6330e3cfb
SHA1eedcc4d5f8cda0827ecf5e3345661daf215a8610
SHA2566e6f1da5ca4a2c105c685d8d9fdc4ef6024b933a620eb3585fcfdbc3fcfc100d
SHA512ea30a29839e7e93457c1816e1fdfdfaa924f50da0fe3cc2022bb6f7c04b62eea6bd86a0b92b1a915cdfdb32e30c5b94ad8d3d7cfd8b5b3f8d6452b0cf1f7d90a
-
Filesize
2.2MB
MD5e9ef45109360c3deb5ba1be878fc80dd
SHA1c40a8d97f9b1f3c8f73fe64bc441b0aeb6e289ee
SHA256826678b2c342d10e1f37f1fa4bef1a23f2a5e333a134eb9ee28bd87c4fcd622a
SHA512704b120d7224780b4de3e61bcc7398a9f73ff268233d5a86129741ff83187b5ba1825f4a86408a2ef6455cbbd5c0f33aee7484bc9c3528a3a6ea9a203f54905c
-
Filesize
68KB
MD596b05aa0c7699b30448a7d08cf119e17
SHA1d093a32e7e486b4dbadf9fc874a5ca01dcc0db46
SHA256868bc5a001941bf163c9221272b79c7e7d8405533e7f892a3fbba30ac63bf65f
SHA5120b262c31d4aa2e5d83c0fa6fcabf46aeaf93d3f2792450f0ff3acca5dc0634d61d5b80925b22ae08bd473e09c6b69336aa7e53013093b056af4c396606a04866
-
Filesize
1005KB
MD586a47e2193f808ae35d3addc8bcda134
SHA1c2562c5d5173db00d0da923ee9bef22fdf6c7507
SHA256732d77234b993d087c81fddf8c5da66703bbb67d00227100b39d12709d5dbfb0
SHA5127a0f0e9f443c054983a15c359b303591a564799ac7616ca1ccbf3aeefeb78104aeb2409d64e984dfea0bda97a97d27aa25ca2f59e8719917d8e1245d91476a1e
-
Filesize
963KB
MD5973f67c62dd08ab6baff8b0db3d56c16
SHA1ff4e61ca69c730f9aad76a9646014f63ce81ee60
SHA2569de6fa05cd33d5681d53ab9558ab8b697d1c4b13017b29b3e8f3aafbed9bfcd3
SHA512dfa5dc918d7700cae4ed463a83a022a91df5b55e6784e21c3649ea7b52fe6a1ecedc48a34871e3525c300c23707df63f19792dc8518dfd31b25ce02981e73196