Malware Analysis Report

2025-01-19 05:27

Sample ID 210904-12r8aahfem
Target 02368_Video_Oynatıcı.apk
SHA256 fe6255f07855951d3ef507a76a564ed18d7526d86a53a1761f505b6eecc5c5af
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

fe6255f07855951d3ef507a76a564ed18d7526d86a53a1761f505b6eecc5c5af

Threat Level: Known bad

The file 02368_Video_Oynatıcı.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Reads name of network operator

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-09-04 22:09

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-09-04 22:09

Reported

2021-09-04 22:11

Platform

android-x86-arm

Max time kernel

3000897s

Command Line

com.emzgdadj.qahjolv

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.emzgdadj.qahjolv/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A /data/user/0/com.emzgdadj.qahjolv/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Reads name of network operator

Description Indicator Process Target
Framework API call android.telephony.TelephonyManager.getNetworkOperatorName N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A

Processes

com.emzgdadj.qahjolv

com.emzgdadj.qahjolv

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.emzgdadj.qahjolv/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.emzgdadj.qahjolv/code_cache/secondary-dexes/tmp-base.apk.classes4301340137112858132.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.emzgdadj.qahjolv/code_cache/secondary-dexes/base.apk.classes1.zip.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.emzgdadj.qahjolv/code_cache/secondary-dexes/oat/x86/base.apk.classes1.vdex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.emzgdadj.qahjolv/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.emzgdadj.qahjolv/shared_prefs/multidex.version.xml

MD5 bf490ea82a4e98c9914904348df33634
SHA1 3723e3e1a8b1925eb58890e58c17694391d2dfff
SHA256 2166d213bd4f45a5a12863829ed82c7a4f3177b4502eebd12a5ddbddba65a7fe
SHA512 e72678ccafbb01bab00b9899b7be631ee668061a1aa62f2cc0161b77af50a072e4ba664541b877f1f8a85e02027fb68399fd5b66ec44e7600a88dd9cff904cff

/data/user/0/com.emzgdadj.qahjolv/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 f7910118ef1d6ddff2f6287afc64b04d
SHA1 30499527141401673433f41c336f764056dbf374
SHA256 590ae64f3e93432f8368b3b00be4e522cc311c80a0ab459e0796169ec75761b8
SHA512 06e549422ad7846b4f39ad09cfe232596f687da0e9d107163520297f831a2e3e1498d56d127fdcad6762d3c4112abea02109f24fd2987a5c53bfcea9d60bc959

/data/user/0/com.emzgdadj.qahjolv/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.emzgdadj.qahjolv/shared_prefs/pref_name_setting.xml

MD5 7ae5a7fea833c51f5d0f41f19371e280
SHA1 ea19b525e6f4b903b8be93f3a8c7cbd00496b6d9
SHA256 a6b98a282d47a36f29ef545ec4322e625226f4530cba9212cf4a4243e492464a
SHA512 2475ce376a4a7337816d1962f879761ec3900dd970598e4b04d4308cf79c685a7e8100ad0b3c313ded9ffa149746b3af7aa422a3131f6737cb1ff273427f7b03

/data/user/0/com.emzgdadj.qahjolv/shared_prefs/prefs30.xml

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e