Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    18-01-2025 22:00

General

  • Target

    d34805c3d70af335fe8ad284618c83e316cd33a73cf0debf7578117d72e99492.apk

  • Size

    4.5MB

  • MD5

    44356c2d7ad7b559f4a460a93266fa7d

  • SHA1

    f17718bb1a47b5a84f5044e96f195c3053a60db5

  • SHA256

    d34805c3d70af335fe8ad284618c83e316cd33a73cf0debf7578117d72e99492

  • SHA512

    01176812eb9626079bf3891d796c73b1f5ac49bfbd9336aea444cc9a252df1d8eaf891a605668fc59f7770336ba6cfff30e8fd6b9a07767b88e148c86f6c8dbb

  • SSDEEP

    98304:KMpOC+JZXYJkdMDhNNiO4pG+dlgIAVN7C+Kfn6J96++8UUq7bPSPyTS:+JNQhNNiJpAV8fVX9S

Malware Config

Extracted

Family

hydra

C2

http://waehwedbosntonz30facezconiboesd12312sergag.com

DES_key

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra family
  • Hydra payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Reads the contacts stored on the device. 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs

Processes

  • com.sdqudpliu.tzjzmdnia
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Reads the contacts stored on the device.
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    PID:5093

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.sdqudpliu.tzjzmdnia/app_apk/payload.apk

    Filesize

    974KB

    MD5

    3baeaa766ea7f31a9147208efd957c75

    SHA1

    c701de3d0e55425394ccbf8e0967639e86f3c54e

    SHA256

    75e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d

    SHA512

    9f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f

  • /data/data/com.sdqudpliu.tzjzmdnia/app_dex/classes.dex

    Filesize

    2.7MB

    MD5

    8a0a0d8820759a59d0ad9fcc10405a2e

    SHA1

    e5ccb617c3af13a6469a876654a89550f41944f6

    SHA256

    6a05560e79f014e86015a0879a264844b3e35d85d4d7f980aa58090dea1a8122

    SHA512

    be501d7e80d372c8e5ab7d6bc6dd410e0b4a08be99d7ca800d88ddd2e84856cc40f73618bb87f378fcf5eba78e3334b6edad02b67d45ca28a0449d614c077ff9

  • /data/data/com.sdqudpliu.tzjzmdnia/cache/Qg3adw2CpmSHwj59qrSgHGA9mVSkpmKkIJmNakGa.zip

    Filesize

    65.9MB

    MD5

    d70516b1ade525314b60482d674f1876

    SHA1

    99d47df22a28afc53dac0e503141d02c05961f5e

    SHA256

    3960ebcd4bb8fbcea80e3c665b2025d5072442720022610925b619059539bbc7

    SHA512

    17cab3e5ccfcbebd3621305d6a4f5c00aa55de260d6de630dc17c1ec6441740a55abf3427246cd3f9083c28555ae341b10404fe8186409d5c6b3c6b3eafe7846

  • /data/data/com.sdqudpliu.tzjzmdnia/cache/classes.dex

    Filesize

    1.3MB

    MD5

    95bdd19a713267d008c27bb16412d23a

    SHA1

    007052f7005faefb8f29924517b0f55fe659227d

    SHA256

    800c762b2fabcf2b9949928bf1d90c491d3fefcaaee152479bd4305b9b227e61

    SHA512

    4d987d84aec82a4f0e7ef0250530910e2afb906479c2220297c6e4398a7bf9ff988d7d1100bd46d6d5e61f0bebb2b6f8ffcd20a26e1c593aac7956a423d0fbea

  • /data/data/com.sdqudpliu.tzjzmdnia/cache/classes.zip

    Filesize

    1.3MB

    MD5

    97b67d4b68b738c18a1756eaf12eb305

    SHA1

    978292a6e26134c1c212857366b733aae94af16b

    SHA256

    68f9d578e8751a1e51e8b8d0aca0e7a27094e34c204b199efc122e3034fe34aa

    SHA512

    06f49979a5847b005caccc12ce33d9e25c7bccbc962ae75f273089b9f3e1085ec59a2f787c1b224b35f6deefd70936f22c6b5fae1167efd922c4aa34e3d0b3cb