Malware Analysis Report

2025-01-19 05:28

Sample ID 210811-p9b7cvf7gx
Target 71c5bd9ef412ea0602a910f63f4baa556719cb901dc6c8b952e7d513cb9061e1.apk
SHA256 71c5bd9ef412ea0602a910f63f4baa556719cb901dc6c8b952e7d513cb9061e1
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

71c5bd9ef412ea0602a910f63f4baa556719cb901dc6c8b952e7d513cb9061e1

Threat Level: Known bad

The file 71c5bd9ef412ea0602a910f63f4baa556719cb901dc6c8b952e7d513cb9061e1.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-11 11:23

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-11 11:23

Reported

2021-08-11 11:26

Platform

android-x64-arm64

Max time kernel

888584s

Max time network

164s

Command Line

com.vtzwnmsy.tnfvuqs

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.vtzwnmsy.tnfvuqs/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.vtzwnmsy.tnfvuqs

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp
N/A 224.0.0.251:5353 udp
N/A 1.1.1.1:853 tcp
N/A 172.217.169.38:80 ad.doubleclick.net tcp
N/A 172.217.16.228:443 udp
N/A 216.58.212.234:80 play.googleapis.com tcp
N/A 142.250.179.202:443 udp
N/A 142.250.179.202:443 udp
N/A 142.250.178.14:443 udp
N/A 185.199.111.133:443 tcp
N/A 1.1.1.1:853 tcp
N/A 172.217.16.227:443 udp
N/A 1.1.1.1:853 tcp
N/A 1.1.1.1:853 tcp

Files

/data/user/0/com.vtzwnmsy.tnfvuqs/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.vtzwnmsy.tnfvuqs/code_cache/secondary-dexes/tmp-base.apk.classes3908403436415985922.zip

MD5 7df6d46f63127049f916b29ac84e9b34
SHA1 4c845d08db1ce39822279a92089c8bb888e9fe23
SHA256 dd823cbe52a894be3547ceab287646acee7929efad7225204c238f7da250de1f
SHA512 0b6882e1b0dd959a66aee13721da0c1cf706d948f2d9b84d45d5b129127d3b0fe7fa1eaf6396f110ccba896d94ac3ec86032cac0748f5a771160e964c2a3c155

/data/user/0/com.vtzwnmsy.tnfvuqs/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.vtzwnmsy.tnfvuqs/shared_prefs/multidex.version.xml

MD5 6b0eecec0d5fa75c1ee30aa259a08068
SHA1 99bcfdc32b76b39063f72c0631d3f751494eca6c
SHA256 39f2878562ba644634898f87a41e6451fe6967c9cf2ca52363cfd5692f64f2d9
SHA512 fe066bc8bfee9e8d0fcb039508e0c2ce7b2eb9779d4d1157c71202aba4efcb1d74175bcbcde2407ca54fdbfb86389436360a827de2cc123cc49b08a97228343b

/data/user/0/com.vtzwnmsy.tnfvuqs/shared_prefs/pref_name_setting.xml

MD5 013672d55cc5f6dbd5c434f075f8d84e
SHA1 7c09f463757aeb914b41602bc92bef815227ae15
SHA256 3a17da7ee1f5d13cf7ed1d8062036ec6cec90b945adee0c6e639534bb1a7f5df
SHA512 9c60deb54696813b62dc6e001b77877507a14a21e3eb3d92d8ca3734a2f8281cf371cf955803f5c49ad0f6ca2bde9fbe3f53ec69ab9afdb3d83c7271683fe2d8

/data/user/0/com.vtzwnmsy.tnfvuqs/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e

/data/user/0/com.vtzwnmsy.tnfvuqs/shared_prefs/pref_name_setting.xml

MD5 71968704c2e98bfc646b2f911e65e0c8
SHA1 a93434e85a16557cfada22b98d870069c8e11b4c
SHA256 6331e638ced2019b04899ed5b5e80623222c05a53c9d322b90058c887d4e928c
SHA512 a92025ce54a8042a51adc8a763948390c521102edf121ab151485dfe4d7f0badc932f437c48a8723b82c4c5391be98aef2674dad1186c3bf4785f16657d4e2a2