Analysis
-
max time kernel
4s -
max time network
150s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
31/12/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
b74ff906b2d2b3fece254bcdbf1936894f2196eb447d6c83c380f281354d2a85.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
b74ff906b2d2b3fece254bcdbf1936894f2196eb447d6c83c380f281354d2a85.apk
Resource
android-x64-20240910-en
General
-
Target
b74ff906b2d2b3fece254bcdbf1936894f2196eb447d6c83c380f281354d2a85.apk
-
Size
1.5MB
-
MD5
818d49b568784a0caecdb174d461d38d
-
SHA1
96a638e8b4b11a41d5b32e2a1026b39323eab6ad
-
SHA256
b74ff906b2d2b3fece254bcdbf1936894f2196eb447d6c83c380f281354d2a85
-
SHA512
a7ed45a862cefef4be41d8e4d6a614e243826a702f6aac04d2c00d99a9d6b193f6dbb0cc4b7f5ed42c5a4abc10d2e695f3e3817ff24f79e7c6d930fd040750ec
-
SSDEEP
49152:dGvRcaUfqKKeIw5cC6GiXgHTVgJ4FVQmfGYczwS4ovrEjY:O+aUqeIw5XgWSJ4FV2YczEjY
Malware Config
Extracted
hydra
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Hydra payload 2 IoCs
resource yara_rule behavioral3/files/fstream-4.dat family_hydra1 behavioral3/files/fstream-4.dat family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /storage/emulated/0/Android/obb/com.grand.ftx/dp/classes.dex 4783 com.grand.ftx /storage/emulated/0/Android/obb/com.grand.ftx/dp/classes.dex 4783 com.grand.ftx /storage/emulated/0/Android/obb/com.grand.ftx/dp/a.a 4783 com.grand.ftx /storage/emulated/0/Android/obb/com.grand.ftx/dp/a.a 4783 com.grand.ftx -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.grand.ftx
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD51e37ffd1218c4f8a1ff15500f787831d
SHA1080a6851a77b28ed97bdb90109dace30b791e754
SHA25614a275985219d4db67b582851b8798c830299d2a2d8382c673d8fa57def0bf3e
SHA512518e35a464d41fe545a56e826b9446270fef8124bd061b8d38140581c3522606cbd48043347fcc11f8eaa249997fc4bd0282f0e74b604b580dfa3ebc28cbf366
-
Filesize
2.2MB
MD5e9ef45109360c3deb5ba1be878fc80dd
SHA1c40a8d97f9b1f3c8f73fe64bc441b0aeb6e289ee
SHA256826678b2c342d10e1f37f1fa4bef1a23f2a5e333a134eb9ee28bd87c4fcd622a
SHA512704b120d7224780b4de3e61bcc7398a9f73ff268233d5a86129741ff83187b5ba1825f4a86408a2ef6455cbbd5c0f33aee7484bc9c3528a3a6ea9a203f54905c
-
Filesize
68KB
MD596b05aa0c7699b30448a7d08cf119e17
SHA1d093a32e7e486b4dbadf9fc874a5ca01dcc0db46
SHA256868bc5a001941bf163c9221272b79c7e7d8405533e7f892a3fbba30ac63bf65f
SHA5120b262c31d4aa2e5d83c0fa6fcabf46aeaf93d3f2792450f0ff3acca5dc0634d61d5b80925b22ae08bd473e09c6b69336aa7e53013093b056af4c396606a04866
-
Filesize
1005KB
MD586a47e2193f808ae35d3addc8bcda134
SHA1c2562c5d5173db00d0da923ee9bef22fdf6c7507
SHA256732d77234b993d087c81fddf8c5da66703bbb67d00227100b39d12709d5dbfb0
SHA5127a0f0e9f443c054983a15c359b303591a564799ac7616ca1ccbf3aeefeb78104aeb2409d64e984dfea0bda97a97d27aa25ca2f59e8719917d8e1245d91476a1e
-
Filesize
963KB
MD5973f67c62dd08ab6baff8b0db3d56c16
SHA1ff4e61ca69c730f9aad76a9646014f63ce81ee60
SHA2569de6fa05cd33d5681d53ab9558ab8b697d1c4b13017b29b3e8f3aafbed9bfcd3
SHA512dfa5dc918d7700cae4ed463a83a022a91df5b55e6784e21c3649ea7b52fe6a1ecedc48a34871e3525c300c23707df63f19792dc8518dfd31b25ce02981e73196