Malware Analysis Report

2025-01-19 05:28

Sample ID 210726-jz7tpgld8n
Target o2-Netz.apk
SHA256 3640f09bff39e3a943195ecac50c30017890013dadc9d8528fd2220e218f9abe
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3640f09bff39e3a943195ecac50c30017890013dadc9d8528fd2220e218f9abe

Threat Level: Known bad

The file o2-Netz.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Hydra Payload

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-07-29 14:56

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-07-26 09:12

Reported

2021-07-26 09:14

Platform

android-x86-arm

Max time kernel

3793242s

Command Line

possible.stay.tank

Signatures

Hydra

banker trojan infostealer hydra

Hydra Payload

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/possible.stay.tank/app_DynamicOptDex/wuwJxr.json N/A N/A
N/A /data/user/0/possible.stay.tank/app_DynamicOptDex/wuwJxr.json N/A N/A
N/A /data/user/0/possible.stay.tank/app_DynamicOptDex/wuwJxr.json N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A

Processes

possible.stay.tank

possible.stay.tank

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/possible.stay.tank/app_DynamicOptDex/wuwJxr.json

MD5 a7bcc535e1887f642f1aa030dd525051
SHA1 4391a714f37fc0f3d1e790c2b26478e86fd6d983
SHA256 1193d375b36622985e1ed16ac530654b9eb5572e0901805fbf0d4aa0a6c9f5ab
SHA512 ad53263d7aa7ed228ea3d87cfed1a9a154bbe50616715dcb9ec41681645fd45a12d256bf61bb0cda052cde52806c500308ce4de274429670a359d16ca55e16f9

/data/user/0/possible.stay.tank/app_DynamicOptDex/wuwJxr.json.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/possible.stay.tank/app_DynamicOptDex/wuwJxr.json

MD5 386c9e8f49720a742a518523d4f32140
SHA1 c8fcf5da3d78173798297dc52f101ff908868dd4
SHA256 2c20eb3cc10b45bf55cdad1c01469c3ebb2341404fbc7e4c01bc4b51ab210aa3
SHA512 20c74e0bed28e55c71372c2c45e273c2d75fa88fd35d7afa81caffa57cba0f175408b2a68fa0dcaec87e7949ad3b90561f7b380d6af4678d12363fbb550d38b5

/data/user/0/possible.stay.tank/app_DynamicOptDex/oat/x86/wuwJxr.vdex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/possible.stay.tank/app_DynamicOptDex/oat/x86/wuwJxr.odex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/possible.stay.tank/app_DynamicOptDex/wuwJxr.json

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/possible.stay.tank/app_DynamicOptDex/wuwJxr.json

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/possible.stay.tank/app_DynamicOptDex/oat/wuwJxr.json.cur.prof

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/possible.stay.tank/shared_prefs/pref_name_setting.xml

MD5 b3053ddcc9e9d32773462b2a8fc24f20
SHA1 3ffdd8514d0967c20f584f477dc03b3cfc7cdf1b
SHA256 f59c84dd0947e1589f30d584ebd7c9fd12cf28e24663eab5de6577003325008d
SHA512 5a669fb25e17bbb19e7f227468ef82c593969f39a5e79b264df84bd6a888b5e4a55a86ccd6a0ce6d2c8589e2e9af03e5579c62c05a1d10b5eaf6e01d88538cae

/data/user/0/possible.stay.tank/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e