Malware Analysis Report

2025-01-19 05:29

Sample ID 210801-y2qqvhlvls
Target 86207_Video_Oynatıcı.apk
SHA256 3e69bc260954f7afcd9a36dcfd1a93e9d24ca680bbc370913c023f70d1e761b1
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3e69bc260954f7afcd9a36dcfd1a93e9d24ca680bbc370913c023f70d1e761b1

Threat Level: Known bad

The file 86207_Video_Oynatıcı.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-01 06:28

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-01 06:28

Reported

2021-08-01 06:34

Platform

android-x86-arm

Max time kernel

7042s

Command Line

com.hzjvbika.mjfcpqt

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A /data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A

Processes

com.hzjvbika.mjfcpqt

com.hzjvbika.mjfcpqt

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/tmp-base.apk.classes2963923920494145015.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/base.apk.classes1.zip.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/oat/x86/base.apk.classes1.vdex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.hzjvbika.mjfcpqt/shared_prefs/multidex.version.xml

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 dd4de8be99205a4f3d3566cb02b2f153
SHA1 77b35b1a565c3ef2e2aee8e164e1ed8ea348a7e6
SHA256 9c6ad501e25eb352c57d375e2f99629170bc054c6e0b0c7b51dee3ff1c8d99e4
SHA512 3a8b30677ac1b44445dc1e2b20c5534e332089e6d2acdb4dc18719b0cda1c24456fbd307fecf53ad0ecd63d1b17374cf750b956ee925ce0a1d691b00fa679781

/data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 8b2d4593253b10885b921cb3bed18d2d
SHA1 50c49ca8e17ba6cf6e00db70bb448377a6c9c5e7
SHA256 a945a196c43cecea4aeee691110f28b2e7a60aaa6e69dd70975eb2a89eb37a6d
SHA512 804486e90cd3d9a6ca6ccd7674c1fbe95421de5366d172288e7be21cdb9fa8ff9cbc03fac7c1cac48d7a8e77b90bc4621c1ff76426db7e079c597afddf815fb3

/data/user/0/com.hzjvbika.mjfcpqt/shared_prefs/pref_name_setting.xml

MD5 782f43f195e692b0c9f23e1ea598a9e4
SHA1 d6c3da3e35a3ad397703a506fe3cd5362d1803ac
SHA256 a0fe7d1b587928c885d386d728a580d27d9844ad280789b5f7d08555082db413
SHA512 ba54895939a3645ea760e4096824c415b92e09e917c9f245252cd3af056b93353bd175a74ef023de6988658706b9e376fc0f54e48d804f130db2f5069742f8df

/data/user/0/com.hzjvbika.mjfcpqt/shared_prefs/prefs30.xml

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

Analysis: behavioral2

Detonation Overview

Submitted

2021-08-01 06:28

Reported

2021-08-01 06:33

Platform

android-x64-arm64

Max time kernel

7016s

Max time network

157s

Command Line

com.hzjvbika.mjfcpqt

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.hzjvbika.mjfcpqt

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp
N/A 224.0.0.251:5353 udp
N/A 1.1.1.1:853 tcp
N/A 216.58.213.6:80 ad.doubleclick.net tcp
N/A 208.95.112.1:80 tcp
N/A 142.250.187.234:80 play.googleapis.com tcp
N/A 216.58.212.206:443 udp
N/A 216.239.35.12:123 time.android.com udp
N/A 185.199.108.133:443 tcp
N/A 1.1.1.1:853 tcp
N/A 172.217.169.42:443 tcp
N/A 142.250.200.42:443 tcp
N/A 172.217.169.42:443 tcp
N/A 142.250.200.10:443 tcp
N/A 1.1.1.1:853 tcp
N/A 142.250.179.238:443 tcp
N/A 172.217.169.42:443 tcp
N/A 142.250.200.42:443 tcp
N/A 172.217.169.42:443 tcp
N/A 142.250.187.238:443 tcp
N/A 142.250.200.46:443 tcp
N/A 142.250.200.42:443 tcp
N/A 1.1.1.1:853 tcp
N/A 142.250.187.238:443 tcp
N/A 172.217.169.42:443 tcp
N/A 142.250.180.10:443 tcp
N/A 142.250.200.42:443 tcp
N/A 142.250.200.42:443 tcp
N/A 142.250.200.42:443 tcp
N/A 216.58.213.3:443 tcp

Files

/data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/tmp-base.apk.classes9179522407898106383.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/base.apk.classes1.zip

/data/user/0/com.hzjvbika.mjfcpqt/shared_prefs/multidex.version.xml

MD5 dfc775a325823b3ef6302eb056e1c418
SHA1 65797bc7da764e29b61562281fe5dd87b0064513
SHA256 ca6750306196e0d8031a479576c5f500eaadc27c9b0ee26e0faae6163bc7649d
SHA512 2cd767d3cfeece5fa7ca94d2801e027e9e5880eb9b685c9e2cb82df3c048c74cd2c676c28821058db2e98ae2bcd8b247982de12599318756ef0f998dbdc2e988

/data/user/0/com.hzjvbika.mjfcpqt/shared_prefs/pref_name_setting.xml

MD5 d968f09d9c13a9d3f3568762f9fc4771
SHA1 831747a947dd4393db0b9d758f778d856ab712a1
SHA256 3801f1f166849176512421a2baf5457b9e1bc3b0aad2570cd7a85db629d7e7fa
SHA512 e6c1cb7e04ef336eab73d5f9bbc54db67e170b968950d04cff93886d95362dda5d1e2a938e6558052e44de292a830fd76abac190cf93b5aa24532bf40dfc99be

/data/user/0/com.hzjvbika.mjfcpqt/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e

/data/user/0/com.hzjvbika.mjfcpqt/shared_prefs/pref_name_setting.xml

MD5 123c7dbbf5ed4ae565b907b7718a6829
SHA1 ad5570aa0795144d0c07a7d83d61e51f7d077715
SHA256 a282db5bbd65d449f4f801c6275ef1d8bde733ea503dbd730546996cae1f7575
SHA512 ec7010a60ac440b9cda7697bff87f0868e54fee82a09952c5baacde5717e5295d41abcbee7acf15956e95a11dcc28a5d6f6afd329a9924b47286f9dd58fcb5ca

Analysis: behavioral3

Detonation Overview

Submitted

2021-08-01 06:28

Reported

2021-08-01 06:33

Platform

android-x64

Max time kernel

7002s

Max time network

44s

Command Line

com.hzjvbika.mjfcpqt

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.hzjvbika.mjfcpqt

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp
N/A 216.239.35.12:123 time.android.com udp
N/A 1.1.1.1:853 tcp
N/A 185.199.108.133:443 tcp

Files

/data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/tmp-base.apk.classes188343245096509598.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.hzjvbika.mjfcpqt/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.hzjvbika.mjfcpqt/shared_prefs/multidex.version.xml

MD5 433155c56ba675eaaf7d9fa2af22860e
SHA1 17eb639be03220073b6034635acd3e37892271cf
SHA256 456308fa8fd75f9ed5199e79529544c69ad7a1f080633502a2bf80ee7dc6e200
SHA512 19e694e148cdc85218eea23f88f6386f5e38217b58df66bd11e00791b0b74dacaf4284c8419100c74d530947bc2efe184a1a8b38d29082ef1ea2047b18eaec19

/data/user/0/com.hzjvbika.mjfcpqt/shared_prefs/pref_name_setting.xml

MD5 f958f72e6ecbf7fb0e48f805b6eb5048
SHA1 1175afe7fbc3e66027ea6f6f3a81351d5be4c404
SHA256 4d75ff193f3048860abda8b02f30598b97312691f7906d70f0a4398da21ae4de
SHA512 39319e6a4d7d17fd3c60d3854118ab82ad0b5fbcc7e9186269ccc5b9b9fa0ea0fdadf61a701c660163a76d7ca4d2393e2f890f73851197961bd56a58369aeb78

/data/user/0/com.hzjvbika.mjfcpqt/shared_prefs/prefs30.xml

MD5 12d6ab1d27552f5788e1667ec0eb1360
SHA1 f0c1a775a55b7bb45fe65579b526cf4360c0c4d6
SHA256 52e178aa40fd1c71b3a4e8fdfb73fba744ac754430d94697f4d2aaa6823c0d18
SHA512 87eb0dba3f5fbb8801a5b8a07849c8634698d64333f77d548f4596221d2f3d7cba7288ebb0fe0b7f9357add2636b07c6e9cd24aa887dd6cce6d22a1b7e2d3d32

/data/user/0/com.hzjvbika.mjfcpqt/shared_prefs/pref_name_setting.xml

MD5 a8d7d3844f6924bfaca1ed7ad67d891a
SHA1 766a23a573eb150342224f44547d418c3f2454bc
SHA256 0309afdfe5dac1ce0e7edd3613c01ea27cc3572d67167bc939a9fa6b6f1c02a2
SHA512 0b263c0caee98eb8b04c3348aacd2c330a4e6d37b103aebbba23e6f949fa394c62103e8e5a091c8cbcd09d05a12366f7c2b05a98bfc42045150e0d286434cd0f