Malware Analysis Report

2025-01-19 05:27

Sample ID 210824-67k7extkxs
Target 85106_Video_Oynatıcı.apk
SHA256 182252ae86aae33b4b13b824357bc02218e94ae8daaadb69b85101c08e74773b
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

182252ae86aae33b4b13b824357bc02218e94ae8daaadb69b85101c08e74773b

Threat Level: Known bad

The file 85106_Video_Oynatıcı.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-24 16:58

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-24 16:58

Reported

2021-08-24 17:00

Platform

android-x64-arm64

Max time kernel

2031835s

Max time network

136s

Command Line

com.uqmzacie.uodnfwy

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.uqmzacie.uodnfwy/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.uqmzacie.uodnfwy

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
N/A 1.1.1.1:853 tcp
N/A 1.1.1.1:853 tcp
N/A 172.217.169.68:443 udp
N/A 172.217.16.230:80 ad.doubleclick.net tcp
N/A 142.250.179.238:443 udp
N/A 142.250.178.8:443 tcp
N/A 1.1.1.1:853 tcp
N/A 185.199.110.133:443 tcp
N/A 1.1.1.1:853 tcp
N/A 216.239.35.12:123 time.android.com udp
N/A 172.217.169.3:443 udp
N/A 1.1.1.1:853 tcp

Files

/data/user/0/com.uqmzacie.uodnfwy/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.uqmzacie.uodnfwy/code_cache/secondary-dexes/tmp-base.apk.classes6698768723045587044.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.uqmzacie.uodnfwy/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.uqmzacie.uodnfwy/shared_prefs/multidex.version.xml

MD5 5ac4d3068f104ea786ea2ac4c36f70dc
SHA1 f317111c4d95c955a5d11b1a8720bc3d7266a77d
SHA256 46c7a406c406e9c96780e7e1601608d3a280fa5fa98fabc5fa9534e4e5c0ab91
SHA512 ec96bf2bd68590f6d2e4bcdc18ca86645d641dff8bd8044a9fd3a5c0c26919e7a22bb1aaa7299f8df959791231450c0100e26bb3476431b1074e06a0f41e43bd

/data/user/0/com.uqmzacie.uodnfwy/shared_prefs/pref_name_setting.xml

MD5 8a89faaee63cd08b2775a85ac688a4c7
SHA1 d62aa1f840085d6fd46fe7fe3a37a7765c773fe6
SHA256 c2e31a95d8264866804547d20ebac9b5eec040986cf4a7ec4b07b464429eda65
SHA512 10153906871ca9ed0174fe4faf9f952c8f2edf7db0c8637e0950fbd3c067e1485ef997fcc9ff86384f69993c91beb5e49ee5b9af2a75d1f6f81d585491a53a6b

/data/user/0/com.uqmzacie.uodnfwy/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e

/data/user/0/com.uqmzacie.uodnfwy/shared_prefs/pref_name_setting.xml

MD5 6fe3352adb44e403555cd0acd9292faf
SHA1 e17031e53640ff51c34a01078b45ca43024a6e61
SHA256 e08148f3d2b1a27e03b9202713d14ec2dd797946ebdabb5b311fe444f1955b59
SHA512 e9be2b191fa4f6213761ec89a5e6480579949e0cf0b3ea5dc311efaa305b998e940563df08083f194f4e217fa915e56f10115e091b13c16b45f881eb7d3294de