Analysis
-
max time kernel
146s -
max time network
152s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
19-01-2025 22:04
Static task
static1
Behavioral task
behavioral1
Sample
3b4082e1896b5db67be37c3e054947297894f475e7a47daa07b019fabe2bbaf6.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
3b4082e1896b5db67be37c3e054947297894f475e7a47daa07b019fabe2bbaf6.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
3b4082e1896b5db67be37c3e054947297894f475e7a47daa07b019fabe2bbaf6.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
3b4082e1896b5db67be37c3e054947297894f475e7a47daa07b019fabe2bbaf6.apk
-
Size
4.5MB
-
MD5
c5c5bf08d000dc6ef614938d3cbdc6e4
-
SHA1
11a7b21c473a5ea16ef200d2d4dc50f1d7830afe
-
SHA256
3b4082e1896b5db67be37c3e054947297894f475e7a47daa07b019fabe2bbaf6
-
SHA512
c03e8cd0af55a63c282ac8a85504794b15097b00d9234d6c5d8c5232985cc7c59fe207fd8e19bbb607028b5b135d741ff847550d81240a166df2d80f39edf104
-
SSDEEP
98304:f0vvu9NrefNvGc9IgVRdl8Qd1WTUy4mOf9x:cvvGSNucOgfpdodm9x
Malware Config
Extracted
hydra
http://ayfilopconbeydolcaneydozpahped.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Hydra payload 2 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_hydra2 behavioral1/memory/4376-1.dex family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.qdmtxkaoo.eqvgngeow/app_dex/classes.dex 4376 com.qdmtxkaoo.eqvgngeow /data/user/0/com.qdmtxkaoo.eqvgngeow/app_dex/classes.dex 4435 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.qdmtxkaoo.eqvgngeow/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.qdmtxkaoo.eqvgngeow/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.qdmtxkaoo.eqvgngeow/app_dex/classes.dex 4376 com.qdmtxkaoo.eqvgngeow -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.qdmtxkaoo.eqvgngeow Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.qdmtxkaoo.eqvgngeow -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.qdmtxkaoo.eqvgngeow -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.qdmtxkaoo.eqvgngeow -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.qdmtxkaoo.eqvgngeow -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.qdmtxkaoo.eqvgngeow -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.qdmtxkaoo.eqvgngeow -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.qdmtxkaoo.eqvgngeow
Processes
-
com.qdmtxkaoo.eqvgngeow1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4376 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.qdmtxkaoo.eqvgngeow/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.qdmtxkaoo.eqvgngeow/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4435
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
974KB
MD53baeaa766ea7f31a9147208efd957c75
SHA1c701de3d0e55425394ccbf8e0967639e86f3c54e
SHA25675e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d
SHA5129f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f
-
Filesize
2.7MB
MD58ea53f434f79a9f6124e6bf23dc5e2a2
SHA1247b65154275d6c5fdaf2399ced35fbe21e2ad5d
SHA25689ff8c585f2840438964e8865271d27cec93cf9ff5bd0bd9920986c9fcfabea8
SHA512fa69cd4910e3b3ece9d21f97265b1493e080a5205e6d877b59da707813c5c0b8e3fa19410d2151ec24bb0670328062dd35669c8e4dbc4c81447897e1a6a5fece
-
Filesize
25.7MB
MD597a1f527215977f36ae2e49008807dbb
SHA15e1382519dc363fb3db7f11a63ea93da74d40126
SHA256038271a9973c372971846560fb759a7c2a0a05bd737e3becb6c87e494e871a3a
SHA512a66e895647043bdc562de972ab28da48201864ffa21279c65bf3a80ed98dfbf9bbef33dd33cd9c60a387f1a5b5ef127075fc37e6b29cbfa1893ee11251aa13d8
-
Filesize
1.3MB
MD59aed2805d4d80f4c0a2ae586d31b4952
SHA1eba117e27037255bcbb69bef485da908d5d52cff
SHA2564b10253a44a4d3b82f00bf516881c6e45aa03d79dcef1f935bd2d89d56876e9d
SHA512bd2358f1f8fdabc38cde6b3fa874b880bbe1e5c7687598f819e70b46fc5ea25a4ede5c2cf1914d68ec680d0f6c7d8d19686d0c035bf7697af3b0d9c2fea2fb57
-
Filesize
1.3MB
MD53bf5f8bebd90347916d68133a8561863
SHA16f94d50abc7dec79a73889cf5f5bea2f0a032490
SHA2561f269c049eed87ec947a47620bdc94326b579bc78200ca2c58c22da1f2cd6d6c
SHA51260dfb13ccf8a8855a43b19f99ebc822da36e5c0a81620e8eccf93e712822c524a735d3086d25fb1ac1388d7b56a8fd569ef905f158fd75dbc101c279fad80f5d
-
Filesize
2.7MB
MD5453a87dfdd071ad3617ef84f85b412fa
SHA1eded3f4c313355be9f9e66ba493aa0ea9496a0fb
SHA256f2b472dde4bd2f721279866489807fb1b642462982b44aca078518a462b298a8
SHA5129c77ad5332339ebf9a0fb93b002f43049fa3053284f1e3d0ca787d1b639a11d4aefc5b6c4c27ee9a8889c1a7519298eeae442c4324d40bc074b20fa1aa00b7db