Malware Analysis Report

2025-01-19 05:30

Sample ID 210824-s1hx7f6xj6
Target 2181f9feab8c55822a17e9f73bc20a0bc674b1dfe5c4068a808fc9916f41b112.apk
SHA256 2181f9feab8c55822a17e9f73bc20a0bc674b1dfe5c4068a808fc9916f41b112
Tags
hydra banker infostealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2181f9feab8c55822a17e9f73bc20a0bc674b1dfe5c4068a808fc9916f41b112

Threat Level: Known bad

The file 2181f9feab8c55822a17e9f73bc20a0bc674b1dfe5c4068a808fc9916f41b112.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-24 09:15

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-24 09:15

Reported

2021-08-24 09:15

Platform

android-x64

Max time kernel

2003941s

Max time network

19s

Command Line

com.jixssyyd.vpxavme

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.jixssyyd.vpxavme/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.jixssyyd.vpxavme/code_cache/secondary-dexes/base.apk.classes1.zip] N/A N/A

Processes

com.jixssyyd.vpxavme

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp

Files

/data/user/0/com.jixssyyd.vpxavme/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.jixssyyd.vpxavme/code_cache/secondary-dexes/tmp-base.apk.classes8493209907885132718.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.jixssyyd.vpxavme/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.jixssyyd.vpxavme/shared_prefs/multidex.version.xml

MD5 2e7b45c50081e207fe901c51135803b8
SHA1 59141871a19dca64a2c5fb98600feb180c113337
SHA256 7dbfe0919790f2d590fcf401ff6a837ba0880d6f17dc134c534396f42395a7aa
SHA512 2ce4305e8f11fa9d63aa064fdf2a69ca1f1db40f865c9f6459b303c1b581f42b4770120e2270cc5798018371cc9d0ec48d51c6de9c80d06ff454481a67acd6bc

/data/user/0/com.jixssyyd.vpxavme/shared_prefs/pref_name_setting.xml

MD5 057c8d7ae0c55749106a96a2f6be05f9
SHA1 3994f65b0cd69808bc3102eb156c6ed7138779ac
SHA256 a02256dac859a6cb383d5f1d714e6706416a7b1e5375b174de715e370d8d6051
SHA512 0bdb90ed9cebc3367a2c2d7ce155b3851abc57980b587c7647f8ecbb3f5428f75c2b7ba48c569b53b560b7d8fb112c0652a5fb20f48c63739e36f83492b0861f

/data/user/0/com.jixssyyd.vpxavme/shared_prefs/prefs30.xml

MD5 12d6ab1d27552f5788e1667ec0eb1360
SHA1 f0c1a775a55b7bb45fe65579b526cf4360c0c4d6
SHA256 52e178aa40fd1c71b3a4e8fdfb73fba744ac754430d94697f4d2aaa6823c0d18
SHA512 87eb0dba3f5fbb8801a5b8a07849c8634698d64333f77d548f4596221d2f3d7cba7288ebb0fe0b7f9357add2636b07c6e9cd24aa887dd6cce6d22a1b7e2d3d32

/data/user/0/com.jixssyyd.vpxavme/app_torfiles/geoip

MD5 da86c56d98ea812ce6ab42691e4d1197
SHA1 e3c910f3b2a6c916c7be33a943091ef57048b72c
SHA256 9f65eab86508224b41cbf319314c070f33fdecb250d17247da83ab7b4d436159
SHA512 62095ef018a1e2664b380056141e54f224458727229b309f101b0961616a0e5feeaf8428b9b788df4a1408304a46f6d38bcaf9edda770dd6752251995ae49235

/data/user/0/com.jixssyyd.vpxavme/app_torfiles/geoip6

MD5 18625900e4f9b58af0db8b4a621058df
SHA1 e8bd5b2e6554c27f718f1222667c09680d75f799
SHA256 296911c0f69a26b5fd65f4552f6a141d6cdbb5979f62b8b7db28e7b97e0698f5
SHA512 347006c25eeac5b5cccecd09dafe814cec569e4741c67d3a35dc47d605ef2110adbc0a4e689077c80216059a6a66454bfa525e3cb6fe5b03a781f1f3b8fac6c8

/data/user/0/com.jixssyyd.vpxavme/app_torfiles/torrc

MD5 738b5b83939f390ccead69f0207ba5cc
SHA1 a58b4454324b6ae741c3941c30476af56a727187
SHA256 e5128c148bc888175ad9633ae4d8ae545a29797a7a33431d7ceed9d615d6ac64
SHA512 bd16a104c49f322eb6fea0efa216a7cdd26af74d0fefc2cef9167d65cb7f20743e7f86ba3338a95c2012e6e15dd877834dcafe2e645d25454e00c32c6abe6022

/data/user/0/com.jixssyyd.vpxavme/app_torfiles/tor

MD5 3ffe7e540a5be82f50eccd51dde09828
SHA1 e3d9711da7afed4bc89326d3bf80bbfcad7dc5cc
SHA256 805e8995ae913e691ff3e4b6a5fce1c7d11860940ace43a5187a1f548ddcb24b
SHA512 8679cb1df0f82a830e952d0e9628967839dc7a96c178c481dac96ab01c815dec107b4f1b22aa7481aa0071bff9c541d9cb559a0a7268782e3a75874fbbaba7cc

/data/user/0/com.jixssyyd.vpxavme/app_torfiles/.tor/control_auth_cookie

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

[anon:dalvik-classes.dex extracted in memory from /data/user/0/com.jixssyyd.vpxavme/code_cache/secondary-dexes/base.apk.classes1.zip]

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e