Malware Analysis Report

2025-01-19 05:28

Sample ID 210728-nvx2dlrqe2
Target FlashPlayerUpdate.apk
SHA256 3eba7728425ff722be181f04703abc8e4f4972be4ee0a16dbd904ec12f0aeaec
Tags
hydra banker infostealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3eba7728425ff722be181f04703abc8e4f4972be4ee0a16dbd904ec12f0aeaec

Threat Level: Known bad

The file FlashPlayerUpdate.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer trojan

Hydra

Loads dropped Dex/Jar

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

0001-01-01 00:00

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-07-28 09:09

Reported

2021-07-28 09:09

Platform

android-x64

Max time kernel

3965725s

Max time network

19s

Command Line

com.vdzbwmgd.rmqvvos

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.vdzbwmgd.rmqvvos/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.vdzbwmgd.rmqvvos/code_cache/secondary-dexes/base.apk.classes1.zip] N/A N/A

Processes

com.vdzbwmgd.rmqvvos

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp
N/A 216.239.35.12:123 time.android.com udp

Files

/data/user/0/com.vdzbwmgd.rmqvvos/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.vdzbwmgd.rmqvvos/code_cache/secondary-dexes/tmp-base.apk.classes6315474475419590313.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.vdzbwmgd.rmqvvos/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.vdzbwmgd.rmqvvos/shared_prefs/multidex.version.xml

MD5 0cd111115041e57fc0800f51dee1105e
SHA1 4beaaea6ebab1fcf31a492c1b760967ebfac9895
SHA256 368aae8ba5e59d7d53c0d00cf52b8df24201f52243707a4e8d2bab66adaade5a
SHA512 1fcc3245bc9b68c87f87dd3e275aa0472e8825b664961a49fd2932fb085da35d1bc2f811b81341895a3cc7092dab5180430f5138c177574660916d6f2584aca1

/data/user/0/com.vdzbwmgd.rmqvvos/shared_prefs/pref_name_setting.xml

MD5 0046da6e4e1de117115e0b409399d63e
SHA1 9e31114b8d26309986a2d97e9a8522cafe94ef9c
SHA256 6862cb6e153029d2d7171213a4888b58e9b1e6018232a58e7ffb0bf35a08b866
SHA512 f9fdd7edc207dafe8337255065c0293e92c6f2986dd78ecf48f8145628ef7f1b8f6070dd30cc8c1e16982991b8bfd165812c514eb1fb63603e3ac1c6804d6a3c

/data/user/0/com.vdzbwmgd.rmqvvos/shared_prefs/prefs30.xml

MD5 12d6ab1d27552f5788e1667ec0eb1360
SHA1 f0c1a775a55b7bb45fe65579b526cf4360c0c4d6
SHA256 52e178aa40fd1c71b3a4e8fdfb73fba744ac754430d94697f4d2aaa6823c0d18
SHA512 87eb0dba3f5fbb8801a5b8a07849c8634698d64333f77d548f4596221d2f3d7cba7288ebb0fe0b7f9357add2636b07c6e9cd24aa887dd6cce6d22a1b7e2d3d32

/data/user/0/com.vdzbwmgd.rmqvvos/app_torfiles/geoip

MD5 da86c56d98ea812ce6ab42691e4d1197
SHA1 e3c910f3b2a6c916c7be33a943091ef57048b72c
SHA256 9f65eab86508224b41cbf319314c070f33fdecb250d17247da83ab7b4d436159
SHA512 62095ef018a1e2664b380056141e54f224458727229b309f101b0961616a0e5feeaf8428b9b788df4a1408304a46f6d38bcaf9edda770dd6752251995ae49235

/data/user/0/com.vdzbwmgd.rmqvvos/app_torfiles/geoip6

MD5 18625900e4f9b58af0db8b4a621058df
SHA1 e8bd5b2e6554c27f718f1222667c09680d75f799
SHA256 296911c0f69a26b5fd65f4552f6a141d6cdbb5979f62b8b7db28e7b97e0698f5
SHA512 347006c25eeac5b5cccecd09dafe814cec569e4741c67d3a35dc47d605ef2110adbc0a4e689077c80216059a6a66454bfa525e3cb6fe5b03a781f1f3b8fac6c8

/data/user/0/com.vdzbwmgd.rmqvvos/app_torfiles/torrc

MD5 c99635d8c98f93ee54770350c5c16101
SHA1 1d4ccad5d10f8bca3071da58c29c1f28960acb58
SHA256 8d482ec45b76082d87f18b8b1caa1dbf1f925dd2e1f7da2aec9c90de3423bbb1
SHA512 796c60bd5da258d65a5fa0065f9aa5e84cb24ac7cd2c7855c99aefc1995c530480522538d8ad59738d24737d15e9126a24a5a6ab21a832be502181d80aeeaebf

/data/user/0/com.vdzbwmgd.rmqvvos/app_torfiles/tor

MD5 3ffe7e540a5be82f50eccd51dde09828
SHA1 e3d9711da7afed4bc89326d3bf80bbfcad7dc5cc
SHA256 805e8995ae913e691ff3e4b6a5fce1c7d11860940ace43a5187a1f548ddcb24b
SHA512 8679cb1df0f82a830e952d0e9628967839dc7a96c178c481dac96ab01c815dec107b4f1b22aa7481aa0071bff9c541d9cb559a0a7268782e3a75874fbbaba7cc

/data/user/0/com.vdzbwmgd.rmqvvos/app_torfiles/.tor/control_auth_cookie

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

[anon:dalvik-classes.dex extracted in memory from /data/user/0/com.vdzbwmgd.rmqvvos/code_cache/secondary-dexes/base.apk.classes1.zip]

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e