Malware Analysis Report

2025-01-19 05:29

Sample ID 210807-71sd752qfj
Target 36509_Video_Oynatıcı.apk
SHA256 ccebc2265cae07b7798d8bd7b194ae999f1e9f4b2652d3d220b873c23610f0c7
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ccebc2265cae07b7798d8bd7b194ae999f1e9f4b2652d3d220b873c23610f0c7

Threat Level: Known bad

The file 36509_Video_Oynatıcı.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-07 08:49

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-07 08:49

Reported

2021-08-07 08:51

Platform

android-x86-arm

Max time kernel

533657s

Command Line

com.jrrnwddn.bsjpjlt

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A /data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A

Processes

com.jrrnwddn.bsjpjlt

com.jrrnwddn.bsjpjlt

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/tmp-base.apk.classes3069213741435768765.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/base.apk.classes1.zip.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/oat/x86/base.apk.classes1.vdex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.jrrnwddn.bsjpjlt/shared_prefs/multidex.version.xml

MD5 913997f8e19551baa2542292780c0ab3
SHA1 74b8bcfb7da4086c3f9532c5fbaf85e48ef9315b
SHA256 4d3ecf4c1565a4f1af7f32196ed0eea44e72f2273a3e4659e20b5118ae329b9b
SHA512 720d381ed3eb301dc36fc658648b420093877d6970ed308a9a210a3f895dbe119606afc7444cb84a80caa39685c69d453d8957aaf6af368bfbb9ef6b4da4638e

/data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 bc447d533c22899bf4b97d8086eb935a
SHA1 23c43d8fa3829acd2b34d80eaa687095cec1b001
SHA256 0907f5d0091075cd5f8669aca942a0547a1c51152f0442218274ea4cb6879fb6
SHA512 eed878e6a13c43edad33d74b2d91573867d52beebd2dc79e217dc715bcfa108c9c261111275d4f57cf6902e36281531dff53ddca23e05ac6aa7436a6db6b7063

/data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.jrrnwddn.bsjpjlt/shared_prefs/pref_name_setting.xml

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.jrrnwddn.bsjpjlt/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e

Analysis: behavioral2

Detonation Overview

Submitted

2021-08-07 08:49

Reported

2021-08-07 08:51

Platform

android-x64-arm64

Max time kernel

533662s

Max time network

82s

Command Line

com.jrrnwddn.bsjpjlt

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.jrrnwddn.bsjpjlt

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
N/A 1.1.1.1:853 tcp
N/A 1.1.1.1:853 tcp
N/A 142.250.200.42:80 play.googleapis.com tcp
N/A 142.250.178.4:443 udp
N/A 142.250.180.10:443 udp
N/A 142.250.180.10:443 udp
N/A 142.250.187.206:443 udp
N/A 1.1.1.1:853 tcp
N/A 185.199.109.133:443 tcp
N/A 216.239.35.8:123 time.android.com udp
N/A 1.1.1.1:853 tcp

Files

/data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/tmp-base.apk.classes204422766595908493.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 c8cead98bd56feb8919c2750f502d468
SHA1 c0f8465438d314c526c2d3e1942ec61853757f1e
SHA256 d375d394a8ebc0409a5ed6fa121a0665b9c58c834959377aff2376e6b991f2e0
SHA512 4154459041e4d5fabbee7ac5c620f87a5bd1b59ab84da28da628ae111d8055b8d1a7eb9e67496338d143232a70482fc3b4e566a373eeabcb0517d172e97bdb4b

/data/user/0/com.jrrnwddn.bsjpjlt/shared_prefs/multidex.version.xml

MD5 520dadc8e573f868fa7f65adb48da229
SHA1 9a1bf273af8311c71a10367e8348ab44c69a63e1
SHA256 9bfe33d815ba44b58631327df14ff6b12a2c8bde480644881f2f6c1d582dfc4d
SHA512 2235cbe4382c147ee5853b32175d3eabb51df633eed18ff6256898f1bf3954592d375545af2c06a34ffe9bfb03e5d0e6e0eb81364ad86fc8052c587b48ad735c

/data/user/0/com.jrrnwddn.bsjpjlt/shared_prefs/pref_name_setting.xml

MD5 65661ea8b5a3359d1b5b3acfcdde8ac2
SHA1 42e4b87def1beb0d6e0df5e0654f520772eaf845
SHA256 a6e06c856dee3dd45a3b2b372e6bd6a3f05f389cdd175aa2ab9470ac8c78ff67
SHA512 d568aa4b46c25ca158313dd51e40fbe53f4d80c8e661e521ba176fd8b250d4f9b07c93d4ccacc3951155a0afefc7c4be689080342cf45880e19603b55140d518

/data/user/0/com.jrrnwddn.bsjpjlt/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e

/data/user/0/com.jrrnwddn.bsjpjlt/shared_prefs/pref_name_setting.xml

MD5 5b3424c4da68158980265365ee700a54
SHA1 400a39f87e665141beae00de9a9dc220f87ec3b8
SHA256 7cf3877a0eb56abd220a8ea43c9b8b3b33f7e5dfd6422dbf1c78e48233b5f287
SHA512 562dcbd9075b91eb7a10b1bcbbc1eaf27f3dc1065d5a9c400ed78752e6ac9b8e1b2b078ebd903c008d68eaf76e223c7c849e1b6287ffe4998ac6f47f248d61c4

Analysis: behavioral3

Detonation Overview

Submitted

2021-08-07 08:49

Reported

2021-08-07 08:51

Platform

android-x64

Max time kernel

533654s

Max time network

39s

Command Line

com.jrrnwddn.bsjpjlt

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.jrrnwddn.bsjpjlt

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp
N/A 1.1.1.1:853 tcp
N/A 185.199.111.133:443 tcp

Files

/data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/tmp-base.apk.classes8909091997587920269.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.jrrnwddn.bsjpjlt/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 710e629c1f0e50539156287a6a8935ad
SHA1 b7cfd8a29f155864003ec7d18669e320b872ce0d
SHA256 7a0a90499baeb575a608edd30842f7b0e6ea9fb6934544c6c36629de1f4ad3de
SHA512 9a96c614644458ef343fd07005085bc58d2fc244e563dba3a4068113e83c53322bf9fd4eb8df614efb252df6b908da4c35f73bc794251fe103d6cf81444b5dc2

/data/user/0/com.jrrnwddn.bsjpjlt/shared_prefs/multidex.version.xml

MD5 cf4ca8060001c15624526b85436a8b8a
SHA1 662a357ffcbc47aaa0c0e3f5211e3ce711a9023c
SHA256 2b13de21a40fd6db261f235d8af2c58870d80f87c76b638b0fd3b75b7efb2e4e
SHA512 32f310e709d19d791251eff979922f48b725f994f907f6b5a4d15c9675a7df166711ff21a4061fa878388a59481ef5ae1bfc38d4efb8f4641860b4bda585977d

/data/user/0/com.jrrnwddn.bsjpjlt/shared_prefs/pref_name_setting.xml

MD5 02998e4ddd70dc0fef6ea877b45c569d
SHA1 087d70afda31068c701e3b7f88f7e502dce6a4ea
SHA256 9740d9f868235268ee026b111ee335226e35f80255439eae3aac096c4c964dab
SHA512 18a567a7e7753fbd1c627b75a478312b08db055c17a3bbd6a28a072393ba62255b4152e78d6a6dedd361e97ee5da23573f3a12f1a084c64dd1292f87d8b374fc

/data/user/0/com.jrrnwddn.bsjpjlt/shared_prefs/prefs30.xml

MD5 12d6ab1d27552f5788e1667ec0eb1360
SHA1 f0c1a775a55b7bb45fe65579b526cf4360c0c4d6
SHA256 52e178aa40fd1c71b3a4e8fdfb73fba744ac754430d94697f4d2aaa6823c0d18
SHA512 87eb0dba3f5fbb8801a5b8a07849c8634698d64333f77d548f4596221d2f3d7cba7288ebb0fe0b7f9357add2636b07c6e9cd24aa887dd6cce6d22a1b7e2d3d32

/data/user/0/com.jrrnwddn.bsjpjlt/shared_prefs/pref_name_setting.xml

MD5 2a959b36ecbc2c3a799198f78e8aa796
SHA1 bbba19c51dd4b1c98e6137b79dbebc09a42d39a5
SHA256 f2aa108056c36185b4bb2f8c360e855ff2cea20bb9ae72cf73df2916adc9deb5
SHA512 ac0edc8badb218aaefb209aca9074831a1d5408a8c645ac067fa494a78ffaec2d7c010041e60d37a3cd76c8d1e3fb251ae806f931f1f1f72c24b7a0bbb00baca