Malware Analysis Report

2025-01-19 05:27

Sample ID 210826-9k2zm527kj
Target 25109_Video_Oynatıcı.apk
SHA256 03c8cba14139423ec179759052b178852ef7a3884a969876c2123bec7f7f8c65
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

03c8cba14139423ec179759052b178852ef7a3884a969876c2123bec7f7f8c65

Threat Level: Known bad

The file 25109_Video_Oynatıcı.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-26 19:32

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-26 19:32

Reported

2021-08-26 19:34

Platform

android-x64-arm64

Max time kernel

2213880s

Max time network

129s

Command Line

com.sqjuuzpr.ryxjuzs

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.sqjuuzpr.ryxjuzs/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.sqjuuzpr.ryxjuzs

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp
N/A 224.0.0.251:5353 udp
N/A 1.1.1.1:853 tcp
N/A 142.251.36.42:80 play.googleapis.com tcp
N/A 216.58.212.206:443 udp
N/A 1.1.1.1:853 tcp
N/A 185.199.111.133:443 tcp
N/A 216.239.35.4:123 time.android.com udp
N/A 1.1.1.1:853 tcp
N/A 1.1.1.1:853 tcp
N/A 142.250.200.3:443 udp

Files

/data/user/0/com.sqjuuzpr.ryxjuzs/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.sqjuuzpr.ryxjuzs/code_cache/secondary-dexes/tmp-base.apk.classes7889278488546282956.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.sqjuuzpr.ryxjuzs/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.sqjuuzpr.ryxjuzs/shared_prefs/multidex.version.xml

MD5 55c48dc755441e93d01c4cd29485cc40
SHA1 a1a53cc13db89ca045e70cc92c6145c4d491863c
SHA256 05622bf3190fd9a01e828236f63cc8f835ff3b22b16b3e54a4ba5894e680858e
SHA512 d7714a89f503a4895c679e3c50223d8167ed22f3e99c4d856119089d13de3eddd81af70ce0f536c10ebf8b76303945f5a5a0e802c0bed975d45205acc8c96883

/data/user/0/com.sqjuuzpr.ryxjuzs/shared_prefs/pref_name_setting.xml

MD5 6bd9ee3c66879425c3d93acf80171fdc
SHA1 4c25d249f302191e87958cb80c78a67d24753d26
SHA256 92649f515340821f67a7d3ad9b81c33bb194d091d35045fdbbc91b092cf03eea
SHA512 b9af83650d0abdf6b316178c598bae548e1bf4a42def22dff762fd65bfac968702ef1ef8c5e8f4c4e9a2c70e9214cb21d82609b4d511732175bf5b9372fac9a3

/data/user/0/com.sqjuuzpr.ryxjuzs/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e

/data/user/0/com.sqjuuzpr.ryxjuzs/shared_prefs/pref_name_setting.xml

MD5 1bdd8fde6812defecddc8bdc9bd56cc0
SHA1 2849866f37139f80f4035b74de228757ae2b53e3
SHA256 0a73bbd91dcdf615267da381104531db8bfb8050158940fc45bd16ed91fb673c
SHA512 508b622ad39b628f427a0f4b64ce56d6d2f28350f47c332c8e35aaec46cc1f13df0e386ccf5713dcea9751d6fca3a4573fee5cee6395ebb391d87a87af868211