Malware Analysis Report

2025-01-19 05:28

Sample ID 210810-dmxjs6t9g2
Target 31706_Video_Oynatıcı.apk
SHA256 a8c9c4f38f72cf8cd3cd819936f1c1ea9670541ded180327f7b096a3370f2186
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a8c9c4f38f72cf8cd3cd819936f1c1ea9670541ded180327f7b096a3370f2186

Threat Level: Known bad

The file 31706_Video_Oynatıcı.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-10 12:23

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-10 12:23

Reported

2021-08-10 12:25

Platform

android-x64

Max time kernel

805733s

Max time network

39s

Command Line

com.orkpykqr.voqdvnd

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.orkpykqr.voqdvnd/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.orkpykqr.voqdvnd

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp
N/A 1.1.1.1:853 tcp
N/A 185.199.109.133:443 tcp
N/A 216.239.35.8:123 time.android.com udp

Files

/data/user/0/com.orkpykqr.voqdvnd/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.orkpykqr.voqdvnd/code_cache/secondary-dexes/tmp-base.apk.classes1988354875677968725.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.orkpykqr.voqdvnd/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.orkpykqr.voqdvnd/shared_prefs/multidex.version.xml

MD5 c10517962e6fb06552c05ffe2ac48296
SHA1 498333ae1ef6418240a6c5ba0b39b7fe2e2756ba
SHA256 898c40496c9504f3e589094b3b5d77fdb536eb9c9dbf3ee4801639cb4f8e2099
SHA512 71ca8c845a857380e7338587e3977bd0246ce62a5a729876a4663ecd49720ca21961cf83557197ba2cef1c4b517b42e122e4583a0cb9ec83491e85477971e68c

/data/user/0/com.orkpykqr.voqdvnd/shared_prefs/pref_name_setting.xml

MD5 e114521d47f3272a10f9fffda4d88ac6
SHA1 70d66b0c0862902d1b504501030fe18ce6b27f89
SHA256 4e1c15cc43d49f14157837ead7feba7b545d9ad14c46b09608a8de755470dbcb
SHA512 04368804f0eb978d9088d98ada26b1a146135929f8221f4aef5d47b57b7e8be917fffd032e1e2340fc7df67a1a3ad06c5abb3d755527e736577276f9b1973487

/data/user/0/com.orkpykqr.voqdvnd/shared_prefs/prefs30.xml

MD5 12d6ab1d27552f5788e1667ec0eb1360
SHA1 f0c1a775a55b7bb45fe65579b526cf4360c0c4d6
SHA256 52e178aa40fd1c71b3a4e8fdfb73fba744ac754430d94697f4d2aaa6823c0d18
SHA512 87eb0dba3f5fbb8801a5b8a07849c8634698d64333f77d548f4596221d2f3d7cba7288ebb0fe0b7f9357add2636b07c6e9cd24aa887dd6cce6d22a1b7e2d3d32

/data/user/0/com.orkpykqr.voqdvnd/shared_prefs/pref_name_setting.xml

MD5 1442c93003cf30624faff3b1bb5109ba
SHA1 031af0cb8a4f161948592e492af7b937ceb015b2
SHA256 a42b867a6505ef354bfae752117be4f7575c1c38c41acd2e3535f352599ca45a
SHA512 6b4090d403a33a28f7fecc554a6ab48f9211dea79bba4d94201c146a97fe8440c894ac38125478d36af70e6137c48104270ae1d11b30e2d3a2383b048ffb2719