Malware Analysis Report

2025-01-19 05:27

Sample ID 210812-yqwy8vegdn
Target 20753_Video_Oynatıcı.apk
SHA256 0a50cbf672d0be762bc86f72fe6d9b02c025ee7cb78c60bde53ccbccb6a88857
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0a50cbf672d0be762bc86f72fe6d9b02c025ee7cb78c60bde53ccbccb6a88857

Threat Level: Known bad

The file 20753_Video_Oynatıcı.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-12 11:59

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-12 11:59

Reported

2021-08-12 12:02

Platform

android-x86-arm

Max time kernel

977151s

Command Line

com.xormiofc.nbeyqyw

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.xormiofc.nbeyqyw/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A /data/user/0/com.xormiofc.nbeyqyw/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A

Processes

com.xormiofc.nbeyqyw

com.xormiofc.nbeyqyw

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.xormiofc.nbeyqyw/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xormiofc.nbeyqyw/code_cache/secondary-dexes/tmp-base.apk.classes2526506504223622446.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xormiofc.nbeyqyw/code_cache/secondary-dexes/base.apk.classes1.zip.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xormiofc.nbeyqyw/code_cache/secondary-dexes/oat/x86/base.apk.classes1.vdex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xormiofc.nbeyqyw/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xormiofc.nbeyqyw/shared_prefs/multidex.version.xml

MD5 5651222337258f5ca3cc6e39c93d721c
SHA1 3bac72de398f97c1ff2774482140f59513600c2f
SHA256 7d6b6003d010c9046ae80e0bed690bdadbe4821aacbeefaceeabc133b29b8edb
SHA512 096c30e6beb11f30e9662233ffc1ca95d6b58dc07020332830d45b181bdb7df6acd1fddce1b47a56ed5a798c365b14db04708d7402619301caf1dc88ef5d23ab

/data/user/0/com.xormiofc.nbeyqyw/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 46e0d4cdc536e777f536904fd4fd0427
SHA1 34cd340a1a166a57bdad887c8ca2fd13bdf3652c
SHA256 e0a4fbb6e8e3d6718f8c3ed7bed866b8ecf0e83197c9eb420e6c52ccb79a3acb
SHA512 1ddd50fb8fe433cd7967ac90fdc221fe3120ac62e5a50c7822a81ed7c77a038afce4fcb0131d7117f61766dc637032ff9ce2988cdba8075c2f2ce9c6a0d52158

/data/user/0/com.xormiofc.nbeyqyw/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 f183552deed38e748b53b597f24542ad
SHA1 48e9f1f5f1e388a17b6f362405f4391a9305714d
SHA256 724408b7454c8363e32ca2fb4a39db1126bdd353f6f861a23e7291063635ea78
SHA512 2ad77f643c7de4199b14fac29235dabd3c8ccc8f00b1822c4a0c24e663f65893d0941b0d9ba401ac3dfb82572276529a918e2d9613bd2c680a311bd891f5b14c

/data/user/0/com.xormiofc.nbeyqyw/shared_prefs/pref_name_setting.xml

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xormiofc.nbeyqyw/shared_prefs/prefs30.xml

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e