Analysis
-
max time kernel
149s -
max time network
155s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
19-01-2025 22:04
Static task
static1
Behavioral task
behavioral1
Sample
60c52bd2d8653b28dd0c5f182fd6da55214b8d190f82c4a5cf0eb1870ece4ce8.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
60c52bd2d8653b28dd0c5f182fd6da55214b8d190f82c4a5cf0eb1870ece4ce8.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
60c52bd2d8653b28dd0c5f182fd6da55214b8d190f82c4a5cf0eb1870ece4ce8.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
60c52bd2d8653b28dd0c5f182fd6da55214b8d190f82c4a5cf0eb1870ece4ce8.apk
-
Size
4.5MB
-
MD5
9100b1c97917abfa8853a2bc3133d715
-
SHA1
b8d9cae0e845b39e82bee0f2fa2bc3320fb37e07
-
SHA256
60c52bd2d8653b28dd0c5f182fd6da55214b8d190f82c4a5cf0eb1870ece4ce8
-
SHA512
e18ab3fbe7b718755145f21a2fb5854732b0aaeec379909318f7c55902c221bac420f799dc79e832a62c55c0c412dc0512c517ed54b07c5a492031aed37a3a52
-
SSDEEP
98304:o7d7DYba8bhSRy7Z9zQIx6KiJTt1ZL4bExHEJG8VXs/h:G0bL9z/xn4RjywHEJvJeh
Malware Config
Extracted
hydra
http://ayfilopconbeydolcaneydozpahped.com
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Hydra payload 1 IoCs
resource yara_rule behavioral3/files/fstream-3.dat family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.phlkcuegw.plhaapglu/app_dex/classes.dex 4770 com.phlkcuegw.plhaapglu /data/user/0/com.phlkcuegw.plhaapglu/app_dex/classes.dex 4770 com.phlkcuegw.plhaapglu -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.phlkcuegw.plhaapglu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.phlkcuegw.plhaapglu -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.phlkcuegw.plhaapglu -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.phlkcuegw.plhaapglu -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.phlkcuegw.plhaapglu -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.phlkcuegw.plhaapglu -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.phlkcuegw.plhaapglu -
Reads information about phone network operator. 1 TTPs
Processes
-
com.phlkcuegw.plhaapglu1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
PID:4770
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
974KB
MD53baeaa766ea7f31a9147208efd957c75
SHA1c701de3d0e55425394ccbf8e0967639e86f3c54e
SHA25675e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d
SHA5129f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f
-
Filesize
2.7MB
MD59eb8aa3044db39953c7e17804be37d18
SHA1955e8f8db4c09c6f6d45dce5c6ea78f27d0e4fad
SHA2564e17620058b30a59ca30a55cbad977a959bac3121db7219199e5239b5af5d2b4
SHA512b969fdf66cc4a2772281bb7504c7dbadad1b23346341e3c62c51a6c4781267a7dbe4170e3d1c3726eb99ff6033a1ac61003de811b62060dc467464ef605c47c7
-
Filesize
14.6MB
MD54db835dabc82a2191de74e21696f8aab
SHA19d5dcf5e4acffd542d1402b73a8253255f660e2f
SHA256b9e8fd09760385b993e972a78d46cb90bfdef89d4c8587a6fc4b9a3ea6cda250
SHA51284b37601f5730f8a5090ea8adced510dfe202d18278a07f29b22f8e7562c2067c469d16ad9db2119bb4a0a58578f4cb85ec9d0e173e630649dbe67b253ea27a0
-
Filesize
1.3MB
MD5515a214906ea8239d2a835c63b3e3b56
SHA101f68ebdb1cfe20b25f9536c0c7dc42d7197181f
SHA256e24ad63b11ef1a3f8727ad066a8766ab88e041d7eca90c95dde0be5a3367fba2
SHA51214df3ba673a94fb787290a11adb5d0010746c435cb99748987a7aaac04d97627845f231d616d62a98bb4eecf218f5a2f7eb05d82ef5f775c478c8f094146af28
-
Filesize
1.3MB
MD5906858f8a3cdf7e518117424800d4a4e
SHA1add8d86ef2345a96913181d408adbe0fcc72a997
SHA2567e46e01c28a07decfe522b96a326669ebb81bc46683d230ed2e264f29b034791
SHA512ffc8cae9d655442fbab0bd22180387821e9db6ed70a0ab72e02fdbed723b7d2d7d8c859b6df9801b3a393763ddf29312ffd5d789a4ef8cf30c17ba4a4eb2a1bd