Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    161s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    18/03/2025, 22:01

General

  • Target

    d4c73288263cc04c315398b770312619e3c862063c173949312382c33535259c.apk

  • Size

    3.5MB

  • MD5

    fb952210ad402fc0ebf5742ba8309d33

  • SHA1

    e7fcafc16c9ba50f0caf8aede2f9ac47ce5a8949

  • SHA256

    d4c73288263cc04c315398b770312619e3c862063c173949312382c33535259c

  • SHA512

    6ce7fbda5794a3beae578729b0cf0c6a271705c0f728d7b15bc09534cd6b30b14a74cbd11b86200c10a29e583dfa5c0e2fa63c32471dcf079c92f310385d57b2

  • SSDEEP

    98304:BN2e5I5Y6zseVcQlsvWVyNteAoNZDQ1u0tjbr7cG:Bd5w9VVsvZNxoNBAN/AG

Malware Config

Extracted

Family

hydra

C2

http://fajasdklfjds90932ldkfj920ldsfadsnfozvabozsnerdasa.cfd

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra family
  • Hydra payload 4 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Reads the contacts stored on the device. 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs

Processes

  • com.unaware.tissue
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Reads the contacts stored on the device.
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    PID:4287
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.unaware.tissue/app_fitness/hg.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.unaware.tissue/app_fitness/oat/x86/hg.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4314

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.unaware.tissue/app_fitness/hg.json

    Filesize

    969KB

    MD5

    a60fc1bd35302214b9dbbb9da21adb33

    SHA1

    0e3aae5b7146933ea127262daf2ef67b81cbb01b

    SHA256

    03071c938dcd1f0b608f826abe05bccd425d45fbc52bcadfd7a1ecf40e3484cf

    SHA512

    6a61b7eb2b5e9a0e4443bffe6eb87f9a0954c2fa18c448649a271fae5795230b34fd5c26902d63d04dfd7f5731350f8039f4a853dfdcfd0a767ebc5cc3a3a5b4

  • /data/data/com.unaware.tissue/app_fitness/hg.json

    Filesize

    969KB

    MD5

    14d430fae8584b962a06998be4ab0e62

    SHA1

    a1b6486adabdee5cdfbb5ed4da8e64ced381f0ea

    SHA256

    955dfa0778d7cc972396cd4e8bccfcd94cf9676c927e9978829d739519c0d4b1

    SHA512

    880dd195272bbdcffb913c2dc91830a42c7e588ae6cc1ac26433e2342c365278cfe0216eefe7b4ec530a281fcc4c92b067e392796d810b66062ad2ab02c0410d

  • /data/data/com.unaware.tissue/app_fitness/oat/hg.json.cur.prof

    Filesize

    1KB

    MD5

    f2a822ef2b2ccf90f44c9c637bbb0b9d

    SHA1

    05b3ee7b4d4a66e3a842c9c146d3757b28defec5

    SHA256

    f1537d9c2819a3a2a8865dfa4d0012fef7c038f447606b23109f04f3fcfba9a8

    SHA512

    b3ab60b75f78b3897a14d972d5f1b5e45015cd9ac32de05602700911c13993f576944e241202ef4ba649f94f01024da9f86a7348232c878add92662e9ce36ed4

  • /data/user/0/com.unaware.tissue/app_fitness/hg.json

    Filesize

    2.2MB

    MD5

    9c9fa7db72cc8b8de84e943cf7cff996

    SHA1

    516ca2b6e3493af81b51e9734f490970bb21f7d4

    SHA256

    3bdde6519dbcacd396e3a73a50eb189a7a39b5d442714dd3060fe3579fedb959

    SHA512

    de789710de02a8f9cc15a4785885253c837e3fdb5ffe076079c51f1e51864f0d8acd951066a97f7ec4602c8c088f81baffba74084f3820b37f4bee2f30775e04

  • /data/user/0/com.unaware.tissue/app_fitness/hg.json

    Filesize

    2.2MB

    MD5

    b86222b8b0c7cffc60dc06c443434bec

    SHA1

    e91ccbe2573f198318236cf3845a355d529767bc

    SHA256

    777c111d75b5c69dc915cf9d07401f96fce8997f37fe49773dfdda2e79521424

    SHA512

    704412e2282f57142294741ec1dbfe26667e460029d34220ebfa2f3f795d46231501cc62813db6da1fcf9b1a45ed706ffccad8890b54aa1d9fca53e344239797