Malware Analysis Report

2025-01-19 05:28

Sample ID 210806-bw7w34153s
Target 34081_Video_Oynatıcı.apk
SHA256 d48f7a62bd78239ee8381d924088e6e6e048884bc0a9ee538bb2b6a70cad527f
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d48f7a62bd78239ee8381d924088e6e6e048884bc0a9ee538bb2b6a70cad527f

Threat Level: Known bad

The file 34081_Video_Oynatıcı.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-06 17:45

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2021-08-06 17:45

Reported

2021-08-06 17:46

Platform

android-x64-arm64

Max time kernel

479402s

Max time network

46s

Command Line

com.ntbxausy.rctrzgu

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.ntbxausy.rctrzgu

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp
N/A 224.0.0.251:5353 udp
N/A 1.1.1.1:853 tcp
N/A 172.217.169.38:80 ad.doubleclick.net tcp
N/A 142.250.178.4:443 udp
N/A 172.217.169.74:80 play.googleapis.com tcp
N/A 142.250.200.42:443 udp
N/A 142.250.200.42:443 udp
N/A 142.250.179.238:443 udp
N/A 216.239.35.8:123 time.android.com udp
N/A 142.250.200.40:443 tcp
N/A 185.199.108.133:443 tcp

Files

/data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/tmp-base.apk.classes949277879300975480.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.ntbxausy.rctrzgu/shared_prefs/multidex.version.xml

MD5 d970af2cbd24a2c1652391200ed3912f
SHA1 b63bcb8d40b86dfdeefa2cef0e4956b0db589667
SHA256 fe4a98427e5f2da400f3bfbcbb2b5446b09b55a02db72835afc8bae4dec31b9d
SHA512 94069a5814e897a4fe8b81347be0dab26bc19961f1c946ab322b9639a9c8d705a95238ebf0c99265fe51a1d24407229e45c2903b4a876c3377f871642c5f1e38

/data/user/0/com.ntbxausy.rctrzgu/shared_prefs/pref_name_setting.xml

MD5 f5a5a8102a31f39bd1e55fc74b09c432
SHA1 20921a3d29397843db8621478b453f289367e631
SHA256 af6b5405ebdad7823b0c3b10cf6b10d45c5763072748d8e31a7b68435ef00664
SHA512 ed99a89d0c81eb805488a4a676fb8d6a5e2ec88755a2fa9e6d91415199b2cd3192e1a3ef30cf0630c1c1400e908b06d5b6da1e7bf4993bfcf459a4be17a1834f

/data/user/0/com.ntbxausy.rctrzgu/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e

/data/user/0/com.ntbxausy.rctrzgu/shared_prefs/pref_name_setting.xml

MD5 2630f4d0b90a92e1f859d27071fbd2c5
SHA1 2ce91e1a903bbc8b67ef00ac0530b0a170b9548b
SHA256 1f6518a6e05954ae1cb34e5ae6daa7d376c50838e1a1022365f2d08d041f3a3b
SHA512 72830ae359298dd9cd312876128d3ada9c6250f96a1e6e1fd351b6d6957f1eda019c67e4c113f3dd691b7178e0031a5a070fb149ad2bcacbb916b435801cdde1

Analysis: behavioral3

Detonation Overview

Submitted

2021-08-06 17:45

Reported

2021-08-06 17:46

Platform

android-x64

Max time kernel

479394s

Max time network

31s

Command Line

com.ntbxausy.rctrzgu

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.ntbxausy.rctrzgu

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp
N/A 216.239.35.4:123 time.android.com udp
N/A 1.1.1.1:853 tcp
N/A 185.199.109.133:443 tcp

Files

/data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/tmp-base.apk.classes8607102575932760621.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.ntbxausy.rctrzgu/shared_prefs/multidex.version.xml

MD5 d8951ff0579228b6f2a3ff87f711f96e
SHA1 560bf64612f060c59a57d31ad8ec08a83b82d989
SHA256 7feaac9f7e2d468448b248008512eda20f615448adcdbc3a60f00578b54fd3ac
SHA512 2744b61fb1e386488065ebf13ff251b945b4329ad92f4d6d1917ff3883adda4347aac18c4a21e12124837178eae8374b5ccf901acac44e1b93129b7d2c551a33

/data/user/0/com.ntbxausy.rctrzgu/shared_prefs/pref_name_setting.xml

MD5 ea9b580180045cb2a3a735e71fe325fa
SHA1 3509ca6813dd1236fb1be82680637c8dac6cdbfa
SHA256 d37d0e571511e616c9db6e72f1f7ddba0d9f7f955c325c5bd1fad50e65ef4319
SHA512 f14bf8b69ebaf0be5bde83b4aaf8a8236ee5ff68f500c2e72c20135690665beaf21f5d08b142e6042f1e8b1ec99a4e45b3525c97240e3bb326b238bccc04a6d8

/data/user/0/com.ntbxausy.rctrzgu/shared_prefs/prefs30.xml

MD5 12d6ab1d27552f5788e1667ec0eb1360
SHA1 f0c1a775a55b7bb45fe65579b526cf4360c0c4d6
SHA256 52e178aa40fd1c71b3a4e8fdfb73fba744ac754430d94697f4d2aaa6823c0d18
SHA512 87eb0dba3f5fbb8801a5b8a07849c8634698d64333f77d548f4596221d2f3d7cba7288ebb0fe0b7f9357add2636b07c6e9cd24aa887dd6cce6d22a1b7e2d3d32

/data/user/0/com.ntbxausy.rctrzgu/shared_prefs/pref_name_setting.xml

MD5 dcc89cfb788593b1a89e9886b71833a1
SHA1 dc78f1314836c56fc13723ca9fb0b260ef05cbbe
SHA256 eba17bdfe16c425bdff1bab2910cd5a924e6ab1d1fa1df8a67b0bccda1016ee6
SHA512 eb2d64b3770a0b6340542786bd66973f7e1fa51f1cf6582bbce14a0511beb6ea277670ba0753988a53f17552bb91e64d68fea6116667bc0fba8334727b708107

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-06 17:45

Reported

2021-08-06 17:46

Platform

android-x86-arm

Max time kernel

479395s

Command Line

com.ntbxausy.rctrzgu

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A /data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A

Processes

com.ntbxausy.rctrzgu

com.ntbxausy.rctrzgu

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/tmp-base.apk.classes4773339829598403535.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/base.apk.classes1.zip.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/oat/x86/base.apk.classes1.vdex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.ntbxausy.rctrzgu/shared_prefs/multidex.version.xml

MD5 9ba6e674fec718d16e6f6940a12f9020
SHA1 20eb158d37eaa8cd649fdfb399d2ab4b4088f2db
SHA256 7f9502f3b8655cc47cd2da11e9ade8fa5398372bb3191b0392b47c8389464506
SHA512 ef31be69fa8c21f2958bcb207b25c6592ce4e7ba187284850f4a1d6a47976fd41b2c6e783dde7a71805accf8eeaa83786239dd8fc5b5dfe40e3133ac6cda1348

/data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 2facd9d665d307cf0ad6d09b89ca6d0e
SHA1 338483005909ebff1c8c36fb4ddc74b6b4d14f8e
SHA256 af660cbafc970f31df40fa6c099808cd74c31e1e9347dc26bdeae8826e1a8cda
SHA512 426bc2b701c6f1f6c78dddf69aa501c198c9aab548d94d4b6de85028fd7895bc46dde7d5ad13f7ac8ac3c171e584aad354c55048781b749b9a1cc9373d5fdcb6

/data/user/0/com.ntbxausy.rctrzgu/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 6775397859e9271f585bd9279d872925
SHA1 cfc9deca2ec9b6bd79d3986445d59a4901d58f3f
SHA256 ff0536faa53a2b08c25b8941a15d0fcb3e2acfba34f083f020cf90be8b42753c
SHA512 58e46d9f09305129b75a9b2023291dfe7473fb3a8d84e9e8ea34f067853cf1b57e60e6816219da7ad57c2420981c9e8ae8d9f390ee9abcf3a117b931ea2e408b

/data/user/0/com.ntbxausy.rctrzgu/shared_prefs/pref_name_setting.xml

MD5 6408c1b65bd4e2b05b8ce831c42a32a2
SHA1 3be875cbc1f7e36f53cce042c462c099289248b7
SHA256 17cf13fa5cd8dfcb6eef4ff0f14e04423b895a99bcdb5470a61e651710483fbf
SHA512 255df0bdd2331648c038edd9de6f46d49130b1127deb482a94af8477ae97d3633f992f041642f4bba3c9263aca1b5596b8dc6b9eebf8963e99ee23d3c376aaa1

/data/user/0/com.ntbxausy.rctrzgu/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e