General
-
Target
FFB13C0BDC4DB49055674BD494CFEF1B68105356BC5BE71DEFE4179494BA5D17.apk
-
Size
7.3MB
-
Sample
250414-t9h61svsdy
-
MD5
65ef1010ef453c5a4c8ad36de3232169
-
SHA1
4422d8b9f8079569c5cbeaa5044c523146764520
-
SHA256
ffb13c0bdc4db49055674bd494cfef1b68105356bc5be71defe4179494ba5d17
-
SHA512
cae61051b1826f9c3f005e9843286cbf392c9f81c6dd63cff4763c038399bc8619a771a5a8ea28b89ccdb788243396f9287790f42fe01a31e1d809f53512e6e4
-
SSDEEP
196608:MnEL7KTyMaHBHMW6GfNV2V9VuDWx0RiQdyjynFAL9D3n:MnUGTcH2W6G1V2V/yWabyj40Dn
Static task
static1
Behavioral task
behavioral1
Sample
FFB13C0BDC4DB49055674BD494CFEF1B68105356BC5BE71DEFE4179494BA5D17.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
FFB13C0BDC4DB49055674BD494CFEF1B68105356BC5BE71DEFE4179494BA5D17.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
FFB13C0BDC4DB49055674BD494CFEF1B68105356BC5BE71DEFE4179494BA5D17.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
FFB13C0BDC4DB49055674BD494CFEF1B68105356BC5BE71DEFE4179494BA5D17.apk
-
Size
7.3MB
-
MD5
65ef1010ef453c5a4c8ad36de3232169
-
SHA1
4422d8b9f8079569c5cbeaa5044c523146764520
-
SHA256
ffb13c0bdc4db49055674bd494cfef1b68105356bc5be71defe4179494ba5d17
-
SHA512
cae61051b1826f9c3f005e9843286cbf392c9f81c6dd63cff4763c038399bc8619a771a5a8ea28b89ccdb788243396f9287790f42fe01a31e1d809f53512e6e4
-
SSDEEP
196608:MnEL7KTyMaHBHMW6GfNV2V9VuDWx0RiQdyjynFAL9D3n:MnUGTcH2W6G1V2V/yWabyj40Dn
-
Hydra family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v16
Defense Evasion
Download New Code at Runtime
1Input Injection
1Virtualization/Sandbox Evasion
1System Checks
1Discovery
System Information Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1