Malware Analysis Report

2025-01-19 05:27

Sample ID 210819-mz7gzhq6gn
Target 86924_Video_Oynatıcı.apk
SHA256 e9109889d12f015832c3155da91f13dbe08784d553e5df41687af5bed789a9dd
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e9109889d12f015832c3155da91f13dbe08784d553e5df41687af5bed789a9dd

Threat Level: Known bad

The file 86924_Video_Oynatıcı.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-19 15:15

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-19 15:15

Reported

2021-08-19 15:17

Platform

android-x64-arm64

Max time kernel

1593659s

Max time network

125s

Command Line

com.vhrbutsu.roowdte

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.vhrbutsu.roowdte/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.vhrbutsu.roowdte

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp
N/A 224.0.0.251:5353 udp
N/A 1.1.1.1:853 tcp
N/A 142.250.180.4:443 udp
N/A 216.239.35.8:123 time.android.com udp
N/A 142.250.179.170:443 udp
N/A 142.250.179.170:443 udp
N/A 172.217.169.78:443 udp
N/A 1.1.1.1:853 tcp
N/A 185.199.108.133:443 tcp
N/A 1.1.1.1:853 tcp
N/A 1.1.1.1:853 tcp

Files

/data/user/0/com.vhrbutsu.roowdte/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.vhrbutsu.roowdte/code_cache/secondary-dexes/tmp-base.apk.classes4562188803710876678.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.vhrbutsu.roowdte/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 2989b3d2843e4950f9e5f6d67a7267fb
SHA1 60e3cc4b0d08cbbeee2993397327c624016fad73
SHA256 f9da3337f439dcc0c9d8b608e8741f5a8de91bf1243347752b2fee183258256c
SHA512 8bb818f45475970072ddea2c4a771f02df99c002f87bfb03167089978cf424b50241a950b917ddc829c7a2cafbd9ba906f2caee107b3156d5042d94789bc67b7

/data/user/0/com.vhrbutsu.roowdte/shared_prefs/multidex.version.xml

MD5 4998f5c27343f93da06b11739ea40b4f
SHA1 f2f80db095198774c879818599153bb3c3073169
SHA256 7517428c8b2e3f1273314d64e9a43062c07b1e33a164d4944a52acf2e596adcd
SHA512 79850dd04ff062d2f6b387a1f9d815c5a0f4f3f3709971e88b916a990fdcd7c91586ebc225c3c537b9cd77965f8bb917a8bcab379fbe21c0df92a61cd1b26250

/data/user/0/com.vhrbutsu.roowdte/shared_prefs/pref_name_setting.xml

MD5 030dca73ce92edd2659ff42359b04b7d
SHA1 5abe38ef6b02b84f9c6511a85180e9312b6b56bd
SHA256 3388b48087cb617f251e57415ad4ecdf39700f20149fb536004e77206fb2a74c
SHA512 47aa76c2ebbdfe81b608a72143574fa2e007b13d1ef4a130c41b3ac866a22dc49ba489e7ba6ed4a04799dca381a1d8d3eb4719a732847591793e0b79303732b8

/data/user/0/com.vhrbutsu.roowdte/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e

/data/user/0/com.vhrbutsu.roowdte/shared_prefs/pref_name_setting.xml

MD5 5267eab2d12533ff2f3cfa66909bee8e
SHA1 adce78f02ac3b83b6ac6c63fe3ae4300e55fd4fa
SHA256 9b80b230401e88b538c41eaa39102e2c91bf7b29c3f16d72cb0e39b9dc3aebe9
SHA512 a4659c4f379db41ca1ff5ebb754c387468b17046ca3fbbc80b55d0c8382a879b64916c49d58b74bd53a8c4061e69e4254218ab79f9ad660bac1950f7276a1934