Malware Analysis Report

2025-01-19 05:27

Sample ID 210813-g3ryc9yqv2
Target 51749_Video_Oynatıcı.apk
SHA256 20f45f1e7206b07876501aa829adae3e54b3620e733e7b8fee04c448078143b6
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

20f45f1e7206b07876501aa829adae3e54b3620e733e7b8fee04c448078143b6

Threat Level: Known bad

The file 51749_Video_Oynatıcı.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-13 11:57

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-13 11:57

Reported

2021-08-13 12:00

Platform

android-x86-arm

Max time kernel

1063396s

Command Line

com.uewmuueh.nxoqdhf

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.uewmuueh.nxoqdhf/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A /data/user/0/com.uewmuueh.nxoqdhf/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A

Processes

com.uewmuueh.nxoqdhf

com.uewmuueh.nxoqdhf

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.uewmuueh.nxoqdhf/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.uewmuueh.nxoqdhf/code_cache/secondary-dexes/tmp-base.apk.classes749357821967536269.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.uewmuueh.nxoqdhf/code_cache/secondary-dexes/base.apk.classes1.zip.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.uewmuueh.nxoqdhf/code_cache/secondary-dexes/oat/x86/base.apk.classes1.vdex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.uewmuueh.nxoqdhf/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.uewmuueh.nxoqdhf/shared_prefs/multidex.version.xml

MD5 1cfe8e266cd8b2560bd2ca21481e347b
SHA1 875a369d82d8811fe7b947d3f1a8049fa43a664b
SHA256 5533f8152d8ef66f7c69d43a723b3b04e046a40182bac519f173b314436c522d
SHA512 1e2fce88c4d9ca39789ece2860c0da7f0cd956882c57e2191900f519f60acf84fd6e61be509baaf4d2fc64283d51c8fa61a451dc2c785f9b6d20f7ce2744f35d

/data/user/0/com.uewmuueh.nxoqdhf/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 112915adfe0337016e3a4d57892a2b47
SHA1 f5d5a8bae014ee993dd44c51f121451f166450ae
SHA256 ad6de5a82f13309fd783e8c84f316fc74b468aa97a90a3b73f5e77c83c6e54f0
SHA512 61c393325286dff2688cf4ebdbe310a2de9627f928ef28fa270f1b6d3af5553d79ee247346dad944296ca60b509c4c2919b1ab118868f7c7d97c49d90cf258d1

/data/user/0/com.uewmuueh.nxoqdhf/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 72f2039b9d011c02be4127796d640205
SHA1 6b6112d6a1ffaa62e66cad5213125d3c380c3e57
SHA256 8721defb159162d4e5d6150c22ba76ca90430b16f38fcdae29cdc0c4fb535192
SHA512 54abe0e49458377c8bc378aaf5d42e5c3e012628a70cea88c75c588392ea427992ce3dee7342d59b3bea945be1d2dec6f4c08b4bbbbcc7e03d8fa97fbfd69224

/data/user/0/com.uewmuueh.nxoqdhf/shared_prefs/pref_name_setting.xml

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.uewmuueh.nxoqdhf/shared_prefs/prefs30.xml

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e