Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    159s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    16/02/2025, 22:01

General

  • Target

    2578dc51496376b92fefcda8030621b1287d2347a82148438542a4ebdb9657c0.apk

  • Size

    4.6MB

  • MD5

    0d7bb33151d9a98973e47fe54a885eb1

  • SHA1

    0a6a1644ba3e459d1ccd949e4c55736a92c04206

  • SHA256

    2578dc51496376b92fefcda8030621b1287d2347a82148438542a4ebdb9657c0

  • SHA512

    99172dfbf2c7dbf8da541b154b5f29c1c489d5d324fcf491b3f5916a8b7602de1418e86b453aed455bdcc5f02dcc69fb371e7835f8b7e2951f14760df75524cc

  • SSDEEP

    98304:VffTfxT5uY19NmMy0dL5jTS4ovGniG3ElCGYlq9VvdravEXjvC:xfxT57bzV3r60i/lhiMvPq

Malware Config

Extracted

Family

hydra

C2

http://1231254123-123d34123-xzccv-1sasdqwe-123cvbe-dqwed.org

DES_key

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra family
  • Hydra payload 2 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Reads the contacts stored on the device. 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs

Processes

  • com.dfzmabwby.wbpjhioxj
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Reads the contacts stored on the device.
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    PID:4591

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.dfzmabwby.wbpjhioxj/app_apk/payload.apk

    Filesize

    974KB

    MD5

    3baeaa766ea7f31a9147208efd957c75

    SHA1

    c701de3d0e55425394ccbf8e0967639e86f3c54e

    SHA256

    75e162dc291e15d13b0f3202a66e0c88ff2db09ec02922ee64818dbddcb78d6d

    SHA512

    9f3ccb1fc9a177524ba2d39f809be4851af385073463893bd4a8664308253fc0da2b9ab330c85675dbe9ce0c44b631a0d1ec7800491687c7b2540504b351295f

  • /data/user/0/com.dfzmabwby.wbpjhioxj/app_dex/classes.dex

    Filesize

    2.2MB

    MD5

    60af84a82afae12ff7052f9ed9cce45b

    SHA1

    1be6ba4a975b25e3ebef93be009d6536c67541d1

    SHA256

    1491cc9fd0391b238fbaacc492791dbb45be3f78536c008f55f8dd40fa80bccf

    SHA512

    042a86513b26c08ed60d7395bcc65f6c2eda778951c5b6d20916704613b5fc414ccfd327f5583f15e67526b73636e8b6ccfa3e1ffe573577c1637f0ff719ca06

  • /data/user/0/com.dfzmabwby.wbpjhioxj/cache/classes.dex

    Filesize

    972KB

    MD5

    c5a37df3cf85474050e8306c056b9cf7

    SHA1

    fdc72e443f1ecbd63890c8cc532dbcd7421196c8

    SHA256

    ae0c7db4a2be86772c697bd9859c50965e8dd14c478db1691e7ba4c9d7c83976

    SHA512

    073e97fe065b956f84f8cf9ad054052b41238a802f97fcc66ee5f0eae3ce3c9115d0ac33c4e5ee98f4d8ae88d29955e90c55c4903e7838f7a636b4153fecd865

  • /data/user/0/com.dfzmabwby.wbpjhioxj/cache/classes.zip

    Filesize

    973KB

    MD5

    f5f722a77c3b6a8d6d08f2cd27bf4fd6

    SHA1

    2bd365abf3d3066ba40a3019084fe864a9cd21d8

    SHA256

    30977adf0b70feea783ef1e4b791a99647ab5628f8fdc841813ac8e441bbf5e9

    SHA512

    019b20daf5c5279f06d2a26345355827a1de4617277e719583e8367a0bfed925b35c51ddb7c0e4e9b1d1495956ad317f0af82c8b6473acccc6df219d3e12873b

  • /data/user/0/com.dfzmabwby.wbpjhioxj/cache/x41bisfTMKrsQCxvJgn9Dm64yPIElwD8H8NZGzsu.zip

    Filesize

    581KB

    MD5

    76e8d476e7ed6482b3c606a6b52d728d

    SHA1

    9a2281ea42db835fb8400c266e46baa6a9938f01

    SHA256

    266b75a47a1330eca4ae1e0922ce76b609ae4072a5dba896f77bd7c76ba8070c

    SHA512

    b47aaf846f315a024685bfbc33cf9edfa4c69ef19f28fdeb622c914daaee590b6956d9a1882cac8cc60799504cfba223210cf0c7ee0062bfffcbf5e7d6145517

  • /data/user/0/com.dfzmabwby.wbpjhioxj/cache/x41bisfTMKrsQCxvJgn9Dm64yPIElwD8H8NZGzsu.zip

    Filesize

    325KB

    MD5

    34820542353aff7a83fe4e9bf89e0a51

    SHA1

    d7b5e444fe3ef45c1e5da5d0794de76e7909c983

    SHA256

    b9d13f8bcdc1fb050e9ccff40f526f6c5626b1a2e5d7b9158a27ddb5f59226fb

    SHA512

    237a1b222d0f7fec3f0bbfa9343165385adfc7915c3a6774acc5f6c1255e14095b604a55dd64c5fcd2f6e7c2bd470557e5862449a2ad78a4ba323aa2094fdc26

  • /data/user/0/com.dfzmabwby.wbpjhioxj/cache/x41bisfTMKrsQCxvJgn9Dm64yPIElwD8H8NZGzsu.zip

    Filesize

    7.0MB

    MD5

    295e95998d2ae869601e04709ca387c6

    SHA1

    124e46bc5c68654be3af16007f6679edf23ecf56

    SHA256

    d8fc78ce3798e225bf6233e59e90aae1a0612c3da8067a9ef850ce671f18f6c2

    SHA512

    a3363b73865ae83c003b18d683970682b983753e31937787713708df38136cfdf0f5c92293d0bab2942da72b1e31740f85cbe7ce691a3c26fc2cdeefbc7c77cc