General

  • Target

    fd6475ed03f1ce5b743382016b7c8125c876c46fc4d0343516621434e4873b4a.zip

  • Size

    2.6MB

  • Sample

    250327-zbveaazly6

  • MD5

    f2ccea29c9924c1ca8c6c063efc70653

  • SHA1

    9cf0428ac65eac88560b0a252f71e3cddfa3823b

  • SHA256

    fd6475ed03f1ce5b743382016b7c8125c876c46fc4d0343516621434e4873b4a

  • SHA512

    19d8b3bb2193e1a44fcb46818e2033bc80a4b954f29997212e9169739460c2b3e91672f08489f1b3a97ff3ff4a0fec2fa4ae534f0821d80e14ef60d9ce76889b

  • SSDEEP

    49152:oEP/rnfngKI7M9Tt/uEUURfYamxNYHZxmz5zFiwX2iXL1:w49x0UCaEY5mFUiXL1

Malware Config

Targets

    • Target

      9cbdd422daf93e15b2135f0f6feebf7428eaaaba4aeaf18c12e882e67a849c89.apk

    • Size

      2.6MB

    • MD5

      723d4d2c92d5d6da8fe7c30e21a3fe01

    • SHA1

      a898aaf26cbccc88c372c59414be88d5e3e7991a

    • SHA256

      9cbdd422daf93e15b2135f0f6feebf7428eaaaba4aeaf18c12e882e67a849c89

    • SHA512

      96b26e1462ba1cc02505c14ee1f54798b1f176c0a95a0564294980315038f5d2eaa02f0c558edd24fefb18dc52f20412044cecab9926b2ccba989bfc3284c895

    • SSDEEP

      49152:bxNEjeXAouzDMDACtf0gx9wfZBobdydftLkvBy/54VgVFzIz+OQ:bxFpuzDJCtf0gx9wRdx6W+VeB6u

    • Hydra

      Android banker and info stealer.

    • Hydra family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks