Malware Analysis Report

2025-01-19 05:30

Sample ID 210824-mcf5ll673a
Target 18562_Video_Oynatıcı.apk
SHA256 1cd704ca2729a62bfab839ffdc5fd1c19de0bc15fb961da305c7ae1ccbe8e1c7
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1cd704ca2729a62bfab839ffdc5fd1c19de0bc15fb961da305c7ae1ccbe8e1c7

Threat Level: Known bad

The file 18562_Video_Oynatıcı.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-24 12:14

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-24 12:14

Reported

2021-08-24 12:17

Platform

android-x86-arm

Max time kernel

2014812s

Command Line

com.kxgosnpq.wxwdgdb

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.kxgosnpq.wxwdgdb/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A /data/user/0/com.kxgosnpq.wxwdgdb/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A

Processes

com.kxgosnpq.wxwdgdb

com.kxgosnpq.wxwdgdb

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.kxgosnpq.wxwdgdb/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.kxgosnpq.wxwdgdb/code_cache/secondary-dexes/tmp-base.apk.classes9080953910771543444.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.kxgosnpq.wxwdgdb/code_cache/secondary-dexes/base.apk.classes1.zip.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.kxgosnpq.wxwdgdb/code_cache/secondary-dexes/oat/x86/base.apk.classes1.vdex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.kxgosnpq.wxwdgdb/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.kxgosnpq.wxwdgdb/shared_prefs/multidex.version.xml

MD5 b836d14be918a84e2a9612d20b9474ab
SHA1 62d36955f57114ad7f709f0f14548d5310c15635
SHA256 e25cdf0c5870f9bbcd02a14b9ea9df0cea855c66b9096e1a84622ed41f2c797d
SHA512 d61e022623095e1f69236cf759e1b3f09c8595f8c87dfc956a39f2613191e570847f418f5630738ab95f3c4b43d712d9c7e4dd8443b4221581564536124d7cfe

/data/user/0/com.kxgosnpq.wxwdgdb/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 94f373827ed29b839f0be6c06abbbc91
SHA1 fff2059ae22413a2c1ab168687a5e0c2a236f24b
SHA256 25eea3cd678992ec2ce18209985935dda983751c4132094de412dd35d6059ecc
SHA512 2d7e6b38f515eddacfe1df1deb8a8dac8463e7cd0471034a0502c2fb704827ccd93a44e999f806ef8ea31810b900f92aa828df41a86bca1d34db9cd8da11b942

/data/user/0/com.kxgosnpq.wxwdgdb/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 c453f94b3198b8bef86197098193a08d
SHA1 638c25cd5ab1f80415de29e227be887d54b93276
SHA256 c62459f3a28020bef4dc449ae7d952f469a8be63c896e50e587498422334b09b
SHA512 c7abed7c702ceb34fe906cf4d417aac5572b989687a9bc86c567f11f699b911e39db8a8d4846695223e98c53914bd25852f61c7a162840f9feaa75ebada50890

/data/user/0/com.kxgosnpq.wxwdgdb/shared_prefs/pref_name_setting.xml

MD5 202b96a80ad04bd938ddf6d514c9eb75
SHA1 0fc4dfb7eaa7dc726671a48ec671a7a2fd5f3097
SHA256 acc404a1b207978c1fa2c1c723e2ede68e17133965e9325197ee7642c5bb2b6c
SHA512 566a52c0d0d4b6bd2c9d84c4b333a63b01b6488b2f45859cff6e6bd24f6e284eec3074d65c874d5cb469d174fe0f528efdf388fe3ff5a91acc4af9dd2f2c0004

/data/user/0/com.kxgosnpq.wxwdgdb/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e