Malware Analysis Report

2025-01-19 05:29

Sample ID 210801-av1pnzgzw6
Target 26453_Video_Oynatıcı.apk
SHA256 78d97e56b62a69a14febd66d7b4e9e981a8ddf0771ffdfae8db7bd68a2ff15b6
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

78d97e56b62a69a14febd66d7b4e9e981a8ddf0771ffdfae8db7bd68a2ff15b6

Threat Level: Known bad

The file 26453_Video_Oynatıcı.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Requests enabling of the accessibility settings.

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-01 06:01

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-01 06:01

Reported

2021-08-01 06:02

Platform

android-x86-arm

Max time kernel

5141s

Command Line

com.loducwqi.ocuxbeu

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A /data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Requests enabling of the accessibility settings.

Description Indicator Process Target
Intent action android.settings.ACCESSIBILITY_SETTINGS N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A

Processes

com.loducwqi.ocuxbeu

com.loducwqi.ocuxbeu

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/tmp-base.apk.classes1100892912730807558.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/base.apk.classes1.zip.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/oat/x86/base.apk.classes1.vdex

MD5 04454bf3acb6464f666efefca2e64471
SHA1 9d3e06702b18807c08496a75bcd60a354b51e596
SHA256 19ea461aca8e9ff82f7f2a8721b19833111e59372e7c1f5eb965d3d03a717505
SHA512 dff08a61d375f9c2220776e5a91c6972a9cf87ad3a8e60ea0b1d0634d9cf4cabe0203b44a5a9273b16180f299149f615a4d3c545306fe6ebe7821d705f42906a

/data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex

MD5 be63395358cc3b0e16b66f294c476138
SHA1 f2d54377bf469cde65a60966e8a9de556a263d6c
SHA256 6055c58e269e55a9adc8558a6b1a7b7f482de7748bbd83a3ffcd5e624e2042bf
SHA512 b270679578494fbc0a29c8efea7ebb1b18a2ff6a03937f89c68fca835a7210b5b7f662e2d27e01d8f6118066aaa054de71ac5cab36c5e868ccfe4d6c25432c77

/data/user/0/com.loducwqi.ocuxbeu/shared_prefs/multidex.version.xml

MD5 48ab2d648b583d69bd67ce009b23b966
SHA1 d5a02eab107d4e6eb285b1955625b4bb77aee33e
SHA256 a170466f96abbdf1f575662b661d1dc3ba0199b7e8710eecbca2b2aad86f8091
SHA512 1367e7528a9e661e9d44463f78ca3df10c5c659687f02438ff23b68760d4bc469aeaeedae0dd3f774a688fc68480e65e626606ceda665328b8bbd42fe44404d6

/data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 9d88949f84d9c61c8d1a9401543d8613
SHA1 170f295ee783f4b420cc8693ebbbd6462a3fa89f
SHA256 ee8cf0a9a6b7608c6f23065362ccaedd3a551655d95f54d2543ba4fb7c9275d8
SHA512 4826387c8562b98f647324b6f82bccdca6f2205cbb748f0f69fc29bda6a7afaab0ce66d2c6f22bf183a04c9bef8524a1812db8d2380fce55733644f5694a58ad

/data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 9ae8ccfc59065716293cbab93c2aafb1
SHA1 b57f63cb1542b105042d981be92b591c1aed210c
SHA256 3be9bc7c7ad894bca06b47f663d56f60f20429d5b810803fff33f321dfdaf85f
SHA512 ca41fa071520eff877fd5dd677cf24657860be47202822c0f27099aea30beb80964c63f2da179236db61a4048a93ee6974d40e6fd948856b7dda83e343ef2d0a

/data/user/0/com.loducwqi.ocuxbeu/shared_prefs/pref_name_setting.xml

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.loducwqi.ocuxbeu/shared_prefs/prefs30.xml

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.loducwqi.ocuxbeu/shared_prefs/pref_name_setting.xml

MD5 86755f77c0d839bf4e0ae8bd955e765d
SHA1 2dc05952924988be6eb79fdf136809b7c8906dfe
SHA256 24aa17194bfb7414c699f24c5db86373e493ae7885fba1f4c642a13958f148f4
SHA512 05d2b96445c97416f64c7c9465dc4f0c11e1fa81f0ee88c0b40f84699aacaa3bd26e654923337cb1202b191bc32d359c4f76d6f0d17ae187e5dacee531ba09ff

/data/user/0/com.loducwqi.ocuxbeu/shared_prefs/pref_name_setting.xml

MD5 038c02e73576e1103dea08160280a890
SHA1 8d591cb8bca55d2509293376ccfd951a864339ad
SHA256 fc7558e15962fba32ff67d2bee33604d671790eb52bf78a03e168358da82354f
SHA512 ce49b7fb4578928fd82be4ff31c2265684080874e8ab30d0c0c4e36769a4125701d9bf3f610fd4896174f8e1821fcf40969aa86b3c03c7902fc071ff06647907

Analysis: behavioral2

Detonation Overview

Submitted

2021-08-01 06:01

Reported

2021-08-01 06:02

Platform

android-x64-arm64

Max time kernel

5126s

Max time network

75s

Command Line

com.loducwqi.ocuxbeu

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.loducwqi.ocuxbeu

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp
N/A 224.0.0.251:5353 udp
N/A 1.1.1.1:853 tcp
N/A 172.217.16.228:443 udp
N/A 216.58.213.6:80 ad.doubleclick.net tcp
N/A 142.250.179.238:443 udp
N/A 216.58.213.6:80 ad.doubleclick.net tcp
N/A 172.217.16.232:443 tcp
N/A 185.199.110.133:443 tcp
N/A 216.239.35.4:123 time.android.com udp
N/A 1.1.1.1:853 tcp

Files

/data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/tmp-base.apk.classes5350536038110161869.zip

MD5 9af2c7887ac70ed1e275de7aa4f0d7a8
SHA1 7d6b7dfdf2afbd8658bd052f90e9927b56213730
SHA256 22e6a9991fa3dc46d664e42403675347abdc4482c7d007016916f1621c778343
SHA512 d840d8c18844ac97da5ae6c47510ba4b785adb26af1bce77575eed0cdcd26e437cefc2fde30f8c651866d7ddb8197055affdd30847a16bd34077ec4a0ae037c0

/data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/base.apk.classes1.zip

/data/user/0/com.loducwqi.ocuxbeu/shared_prefs/multidex.version.xml

MD5 4928a588e6b31dc28c1eac12e0001879
SHA1 0df2c790cdf885e2a6fcc467af0351c373d7152e
SHA256 2b9c7821b726925f5280a487af4c580fa77e5b0efa962fbc3bf7e4cad7b2c8f6
SHA512 19b21453e1967bbb036e33f39084d750bf5809214f4cc3344e83cc645accb130339745fda263e82f981cf07ec0a14c8473df55349206557925a072a7a47b4b5a

/data/user/0/com.loducwqi.ocuxbeu/shared_prefs/pref_name_setting.xml

MD5 b684d377b2fc65654e7ac4983509897f
SHA1 f73ba4a845524a8ea975504b0d4ab8cd2ce6c514
SHA256 b324cbef365ba34e19d3af48208ec611e772355650adffde3aea5d210065b42a
SHA512 97c20f76141d3ccc8c3ebab9d4ed03c6e3fb77bb04aad0ecfe810f10bada1ad2dd7d6bc62a6e65174a95fbe876b58b0ed61a25bdc1db227a3f68e59be08e8db9

/data/user/0/com.loducwqi.ocuxbeu/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e

/data/user/0/com.loducwqi.ocuxbeu/shared_prefs/pref_name_setting.xml

MD5 3c2f3a163b116c3bb08bfd85c7f6e830
SHA1 04f060b79779b9f26f30da2a5c449e940ae8355d
SHA256 0a40e4cb207df0f4aeebf2f87b281d43100766fba5f870867f2a0f258a4cc07a
SHA512 476942c19aec95b3ec24b93863499928e211df8e196d8fc4a76dbf784da662eb4fcd21e3a6047198faf1fa6b5b6487be84996ece93388d2da61119b6f2149623

Analysis: behavioral3

Detonation Overview

Submitted

2021-08-01 06:01

Reported

2021-08-01 06:02

Platform

android-x64

Max time kernel

5125s

Max time network

54s

Command Line

com.loducwqi.ocuxbeu

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.loducwqi.ocuxbeu

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp
N/A 1.1.1.1:853 tcp
N/A 185.199.108.133:443 tcp

Files

/data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/tmp-base.apk.classes6486206448498610038.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.loducwqi.ocuxbeu/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.loducwqi.ocuxbeu/shared_prefs/multidex.version.xml

MD5 86db10e51f8e947067dc91dc358c5016
SHA1 53ace3b6a63afcd2a72a9154e1bb683076af2be7
SHA256 fd61b7d85a0314f77e358b47b26a24e38780b85d7c43b01bfda111715e0cdf9b
SHA512 17ce590575951d40db9a38094a415e050f67ce5b177e594f28239c1592a7b77fcc4ba5817eb750141ca014bd941cea346aabf84728dbdcdc7caba1c820cac84c

/data/user/0/com.loducwqi.ocuxbeu/shared_prefs/pref_name_setting.xml

MD5 d8e3696d51d1edb31c8243efa037b943
SHA1 57301c8346210a4758ca07afb1980c89649b249b
SHA256 ab66ae301355d6da3b384fb31e496203b2e330fc3a3d42de74282f32e742f531
SHA512 2ab34596934e7955ba183b67e0e91c9265df715c30da5c632a63a306c336912aa3f1f4e673db655276ed142d9fe6c2c3f5e5edf1a163847661ecea6faeb5ba91

/data/user/0/com.loducwqi.ocuxbeu/shared_prefs/prefs30.xml

MD5 12d6ab1d27552f5788e1667ec0eb1360
SHA1 f0c1a775a55b7bb45fe65579b526cf4360c0c4d6
SHA256 52e178aa40fd1c71b3a4e8fdfb73fba744ac754430d94697f4d2aaa6823c0d18
SHA512 87eb0dba3f5fbb8801a5b8a07849c8634698d64333f77d548f4596221d2f3d7cba7288ebb0fe0b7f9357add2636b07c6e9cd24aa887dd6cce6d22a1b7e2d3d32

/data/user/0/com.loducwqi.ocuxbeu/shared_prefs/pref_name_setting.xml

MD5 e76fca12092e3a0c03ce6e7b365e57e5
SHA1 4ae6107797c08883317f70e26f366c4c803ac032
SHA256 b4bb520273d047333c67e2c6dd4a4da217b53c08d2bc8831088bfc6d7b36ad08
SHA512 62526d6ab530eb2aa153f3ea0f1a2dc7bf5e6f0d1e0a6eb65417df4b3dc68c2d0d11eed9e860604f47c4e553f275fbf84c05c7934c2a727dd757f7f1932b398c