Malware Analysis Report

2025-01-19 05:27

Sample ID 210824-3b2p1mlvr2
Target 69437_Video_Oynatıcı.apk
SHA256 fc2e4bb692325fc6c3919b3961eb74ae0852c80ff2f02d2438bc45ca9d8be0fa
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

fc2e4bb692325fc6c3919b3961eb74ae0852c80ff2f02d2438bc45ca9d8be0fa

Threat Level: Known bad

The file 69437_Video_Oynatıcı.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-24 16:58

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-24 16:58

Reported

2021-08-24 17:00

Platform

android-x64-arm64

Max time kernel

2031838s

Max time network

145s

Command Line

com.mrujdeez.adisarj

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.mrujdeez.adisarj/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.mrujdeez.adisarj

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp
N/A 224.0.0.251:5353 udp
N/A 1.1.1.1:853 tcp
N/A 142.250.187.198:80 ad.doubleclick.net tcp
N/A 142.250.179.132:443 udp
N/A 142.250.187.238:443 udp
N/A 185.199.110.133:443 tcp
N/A 216.239.35.8:123 time.android.com udp
N/A 1.1.1.1:853 tcp
N/A 1.1.1.1:853 tcp
N/A 1.1.1.1:853 tcp

Files

/data/user/0/com.mrujdeez.adisarj/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.mrujdeez.adisarj/code_cache/secondary-dexes/tmp-base.apk.classes3473988251184203057.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.mrujdeez.adisarj/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 a6b751bc537e1e7e33d914680311fbe7
SHA1 04052a374dfc9b572736ccc2e453e1fb353d868c
SHA256 50c26a0603687e43303050be88373fad82af59d7757ad3ff2fdc5659b8f7e8e7
SHA512 8d9cc48b7e0a278cc4d06643fbb95b5e28f4ac0275871fcfba483d90eabd9d519273ca319e14255207842866dc64531a1c3ae8f7dbc0f683e591837b53d100da

/data/user/0/com.mrujdeez.adisarj/shared_prefs/multidex.version.xml

MD5 7770656a79383bc9b255c75483a038ad
SHA1 117a8f7df3708b907db900b2531a9684281af666
SHA256 9d498b27ba3979524b69173cc44a548a6f87f3a15c44add369364b706e7d8d0a
SHA512 8721462cf5a59c44b0a668c22569dd568982019764ec233cbcf8fe543ddbe2255f309a8a164ba7004934689496fd8349fab0c700affff1b4c3f2708e66f5c0e2

/data/user/0/com.mrujdeez.adisarj/shared_prefs/pref_name_setting.xml

MD5 258a94c26930d89e7e0e6b58b8748869
SHA1 564f4cc65c22ebc22b330e9cacf5e8d4ff5e260a
SHA256 c9889bbbe252b7cdd9ee1ba892ba1b7c2ee7406718254cd64526cff9c4825c84
SHA512 bc761ccde23a6cd7cbe696c75085966ecc6c954913a26b4ddb8f082b863228024e99e18b6c395fa03d2c7716d8a84f8a52d78ddfd3db6d624a5592cc5b44ba47

/data/user/0/com.mrujdeez.adisarj/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e

/data/user/0/com.mrujdeez.adisarj/shared_prefs/pref_name_setting.xml

MD5 adb47dcd635edc413756b0ef0a5b2446
SHA1 61a4677c95d70da9a085b001714eadb27dc5a338
SHA256 6828e28659c47b00e6f69e82368ff36f75f88a2505ad4635c2c8ba3f652b3bb0
SHA512 16ecd14a918ea7e794de5ada05b21c74e366782bace8a980e9092ae0e876a102ca588c87b4fdec82e1a878b80d8bd28bb2489c587164096adf49ce453b0c3533