Analysis
-
max time kernel
148s -
max time network
160s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
18/03/2025, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
5e6ee98bdad3c9879ef56575c41c4b53e297fcad3a715995f71c9dab950d5ee9.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
5e6ee98bdad3c9879ef56575c41c4b53e297fcad3a715995f71c9dab950d5ee9.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
5e6ee98bdad3c9879ef56575c41c4b53e297fcad3a715995f71c9dab950d5ee9.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
5e6ee98bdad3c9879ef56575c41c4b53e297fcad3a715995f71c9dab950d5ee9.apk
-
Size
4.1MB
-
MD5
029afcf139402cb4e439691ed204cb3a
-
SHA1
a53a8d4b6ee0db0012a3daccfa7f4fb68a69f325
-
SHA256
5e6ee98bdad3c9879ef56575c41c4b53e297fcad3a715995f71c9dab950d5ee9
-
SHA512
f6434e125504cbf077d9ee215c064d1eb49d445ee096dcfa2d1d6d0a766881a7a11acd9bcf01e6e7b956fec3e0ebdb21876ec8eff24ba9358e215ca868ea99b9
-
SSDEEP
98304:WCSqVBWfnWMy3KiALMXGv5d6gGVbpz6vyFb8bLdR90voZulQaz9E:WCSq7WPWMy3TALM2ociN19E
Malware Config
Extracted
hydra
http://fajasdklfjds90932ldkfj920ldsfadsnfozvabozsnerdasa.cfd
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Hydra payload 2 IoCs
resource yara_rule behavioral3/memory/4840-0.dex family_hydra1 behavioral3/memory/4840-0.dex family_hydra2 -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.sort.minute/app_satisfy/MOA.json 4840 com.sort.minute -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sort.minute Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sort.minute -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.sort.minute -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sort.minute -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sort.minute -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.sort.minute -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.sort.minute -
Reads information about phone network operator. 1 TTPs
Processes
-
com.sort.minute1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Reads the contacts stored on the device.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
PID:4840
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
969KB
MD5e0f1f86fb0587b18f168d7f40cf51e0a
SHA1138ea71dc78928a2443006c8e64b9900c07b593b
SHA25677437ad3c1b1d48a66be3b53ec89b5bd924ab34384224bd0da72f959967462b2
SHA5129169761d6b05d3feef9fc85288652ea836aa9ebe6150ad963bfc36ca24bdc8c8f14679e5c9b9f672c5d683420eb28d355828d2e73077e22baafb79c2b8d09d83
-
Filesize
969KB
MD522f4c699bca5efa737506af5b348055b
SHA19d0b1e6257583a3bf3dafcce5722a10fdb7fd4eb
SHA2566cc6a8a9ebdd8719b95e3f9fda9a7c26867bf0a7fe3241ec719e04f6a060af19
SHA512d5a370b70410305a31184205cbaa3d2ff3e549b31eb4065b3257fe4c56da903a3f31064675a57ec7fcb2d36d17c44cdfe3124e6f56ba5279d67267e5b799a16e
-
Filesize
2.2MB
MD5596ece6d89b6e800cb108ff3bb2138bf
SHA17594af048fa5bb0b5385cb953e79c3fe46773114
SHA256e5aa076fd71a1784ff54191a8ca2b8a58335601ac825936782650242221870ac
SHA512aabb9b49cf442ba84aabff249b6022195a2a7ab3157cd1562ea20e19dd89bb3adb7e84faf078ab9fb96d9dbf6b4ce0ff5c7d92ef071d5a2cff3ff9c96249e931