Analysis
-
max time kernel
148s -
max time network
156s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
19-01-2025 22:04
Static task
static1
Behavioral task
behavioral1
Sample
60c52bd2d8653b28dd0c5f182fd6da55214b8d190f82c4a5cf0eb1870ece4ce8.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
60c52bd2d8653b28dd0c5f182fd6da55214b8d190f82c4a5cf0eb1870ece4ce8.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
60c52bd2d8653b28dd0c5f182fd6da55214b8d190f82c4a5cf0eb1870ece4ce8.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
60c52bd2d8653b28dd0c5f182fd6da55214b8d190f82c4a5cf0eb1870ece4ce8.apk
-
Size
4.5MB
-
MD5
9100b1c97917abfa8853a2bc3133d715
-
SHA1
b8d9cae0e845b39e82bee0f2fa2bc3320fb37e07
-
SHA256
60c52bd2d8653b28dd0c5f182fd6da55214b8d190f82c4a5cf0eb1870ece4ce8
-
SHA512
e18ab3fbe7b718755145f21a2fb5854732b0aaeec379909318f7c55902c221bac420f799dc79e832a62c55c0c412dc0512c517ed54b07c5a492031aed37a3a52
-
SSDEEP
98304:o7d7DYba8bhSRy7Z9zQIx6KiJTt1ZL4bExHEJG8VXs/h:G0bL9z/xn4RjywHEJvJeh
Malware Config
Extracted
hydra
http://ayfilopconbeydolcaneydozpahped.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Hydra payload 1 IoCs
resource yara_rule behavioral2/files/fstream-3.dat family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.phlkcuegw.plhaapglu/app_dex/classes.dex 5128 com.phlkcuegw.plhaapglu /data/user/0/com.phlkcuegw.plhaapglu/app_dex/classes.dex 5128 com.phlkcuegw.plhaapglu -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.phlkcuegw.plhaapglu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.phlkcuegw.plhaapglu -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.phlkcuegw.plhaapglu -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.phlkcuegw.plhaapglu -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.phlkcuegw.plhaapglu -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.phlkcuegw.plhaapglu -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.phlkcuegw.plhaapglu -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.phlkcuegw.plhaapglu
Processes
-
com.phlkcuegw.plhaapglu1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:5128
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
974KB
MD53baeaa766ea7f31a9147208efd957c75
SHA1c701de3d0e55425394ccbf8e0967639e86f3c54e
SHA25675e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d
SHA5129f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f
-
Filesize
2.7MB
MD59eb8aa3044db39953c7e17804be37d18
SHA1955e8f8db4c09c6f6d45dce5c6ea78f27d0e4fad
SHA2564e17620058b30a59ca30a55cbad977a959bac3121db7219199e5239b5af5d2b4
SHA512b969fdf66cc4a2772281bb7504c7dbadad1b23346341e3c62c51a6c4781267a7dbe4170e3d1c3726eb99ff6033a1ac61003de811b62060dc467464ef605c47c7
-
Filesize
21.2MB
MD58960ce4a205313e5e785648c509ab555
SHA115ed3d0acddf36cc14e129b8700da7f6accdc4bc
SHA2563863bda5134372e44bee3f95b270aef4564a64001b6146e42a13d1a860251936
SHA512227ad448b2ebefcf144c4a47985554449e02852d105a2116e1d21b8ca6831a28b6dc81e201b450ff92cf64d180b2b1c728e653fd0cd23654a85db13980874871
-
Filesize
1.3MB
MD5515a214906ea8239d2a835c63b3e3b56
SHA101f68ebdb1cfe20b25f9536c0c7dc42d7197181f
SHA256e24ad63b11ef1a3f8727ad066a8766ab88e041d7eca90c95dde0be5a3367fba2
SHA51214df3ba673a94fb787290a11adb5d0010746c435cb99748987a7aaac04d97627845f231d616d62a98bb4eecf218f5a2f7eb05d82ef5f775c478c8f094146af28
-
Filesize
1.3MB
MD5906858f8a3cdf7e518117424800d4a4e
SHA1add8d86ef2345a96913181d408adbe0fcc72a997
SHA2567e46e01c28a07decfe522b96a326669ebb81bc46683d230ed2e264f29b034791
SHA512ffc8cae9d655442fbab0bd22180387821e9db6ed70a0ab72e02fdbed723b7d2d7d8c859b6df9801b3a393763ddf29312ffd5d789a4ef8cf30c17ba4a4eb2a1bd