Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
133s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
05/01/2025, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
2ca13ea9430a2e26bf9e7ac93d1b9f23d348b47138a0af6432cacfb33f382046.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
2ca13ea9430a2e26bf9e7ac93d1b9f23d348b47138a0af6432cacfb33f382046.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
2ca13ea9430a2e26bf9e7ac93d1b9f23d348b47138a0af6432cacfb33f382046.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
2ca13ea9430a2e26bf9e7ac93d1b9f23d348b47138a0af6432cacfb33f382046.apk
-
Size
4.9MB
-
MD5
43fc4202bcbbe33a87634c7ce60af179
-
SHA1
2aaef5233aa24f1f6212ac4a50108368e54e1045
-
SHA256
2ca13ea9430a2e26bf9e7ac93d1b9f23d348b47138a0af6432cacfb33f382046
-
SHA512
31b0b2a3c2967f16295a94af4fbc22d16fd78be4ed06c59eeb4dc2ab3369f4cd8a8b6eb9b8f6b01a54b12b002dbcd758547f243074f3b78b49d71262caba9335
-
SSDEEP
98304:v04M9Hr1sCchiKW/xP1SUo2wVYLRJKVy+47esmw:hM9HZEhqpAUCVmGyBqsmw
Malware Config
Extracted
hydra
http://aygidolfaledkzodledaseasedfarkez.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Hydra payload 1 IoCs
resource yara_rule behavioral3/files/fstream-3.dat family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mkrxhmteq.oghkdwuah/app_dex/classes.dex 4504 com.mkrxhmteq.oghkdwuah /data/user/0/com.mkrxhmteq.oghkdwuah/app_dex/classes.dex 4504 com.mkrxhmteq.oghkdwuah -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mkrxhmteq.oghkdwuah Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mkrxhmteq.oghkdwuah -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.mkrxhmteq.oghkdwuah -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.mkrxhmteq.oghkdwuah -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mkrxhmteq.oghkdwuah -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.mkrxhmteq.oghkdwuah -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.mkrxhmteq.oghkdwuah -
Reads information about phone network operator. 1 TTPs
Processes
-
com.mkrxhmteq.oghkdwuah1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
PID:4504
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5046b7e710d9b58d6de1b978951654fa5
SHA1c8babefc3b5fd0f0e2ed2de8b697643dba191b7f
SHA256d19541b9f1576691ad733a557f452ccd7e5c74e871584b7e1ca243675cbbb35a
SHA5129af9023079143b2c338fdf0b8943a027a490d09bcf80b38c154481fed88ba4e44dd6e92864bc5a79c97b290a868f8bd3d7dae04f844784fbd43920689b0dfc59
-
Filesize
1.3MB
MD5c9104f961982120ad9a2678a38c22a9f
SHA1da89d96d219f4ae137ac35b000b13cfd7d5a7547
SHA256fed20a74e54f13a9c9ef38279dd1173d236a821b08972599cb6802e0fb7cd13c
SHA51258e29283068bc7510a61d56b36dfc48234901c941215c6f907213e77d513717c49bf92a8788c89610accc7bd542345a01b5970d92d2a2c21070bddcaac0fd481
-
Filesize
1.3MB
MD59d3a01ec99657b358486ad98baae443d
SHA1a0c2a067084b8108a336ebe384ff6b9a859cb197
SHA2569193314d20cdbfad787c8e3310b48bf5f49bc631a1b481a232bd75f0a9b81307
SHA51245ea2375d5dc74f39a2b3b41e465279093719b716cdf7c082f000d9c8f893669a73ddb2f28b4b23d0e24027513957b7e9593264e6987bb88c2fe023e5f8eba82