Malware Analysis Report

2025-01-19 05:27

Sample ID 210904-1wkw1seec9
Target 61524_Video_Oynatıcı.apk
SHA256 384b2f4bbd5da1e58d66339557c8af0ba67f42059653da081b0c69e1cc1df4c4
Tags
hydra banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

384b2f4bbd5da1e58d66339557c8af0ba67f42059653da081b0c69e1cc1df4c4

Threat Level: Known bad

The file 61524_Video_Oynatıcı.apk was found to be: Known bad.

Malicious Activity Summary

hydra banker infostealer obfuscation trojan

Hydra

Requests dangerous framework permissions

Loads dropped Dex/Jar

Requests enabling of the accessibility settings.

Reads name of network operator

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-09-04 22:00

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-09-04 21:59

Reported

2021-09-04 22:01

Platform

android-x86-arm

Max time kernel

3000258s

Command Line

com.coekfvmv.emkmads

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A /data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Reads name of network operator

Description Indicator Process Target
Framework API call android.telephony.TelephonyManager.getNetworkOperatorName N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A

Processes

com.coekfvmv.emkmads

com.coekfvmv.emkmads

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/tmp-base.apk.classes3572317330452512913.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/base.apk.classes1.zip.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/oat/x86/base.apk.classes1.vdex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.coekfvmv.emkmads/shared_prefs/multidex.version.xml

MD5 d69ef2417467d82f0aff9dbc92e58b96
SHA1 2c4634dbe3ff7a10e0670873b1f412baec481516
SHA256 8f12769cdf56cb71eccb615471d7c17877e17ba22053132ccd923d68fc9210e4
SHA512 db066085c6b4811bd76a3160eeb35959b0a51fdcf4d4b4c58bc63394e1e66b9ba4be280961973afc9dbc814a2f39e3a4eeb23cf586103cd9368ece72051d37c5

/data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 bb97bec635955f1863afa6122697477d
SHA1 7be2db6bec23bab40739ae934fb80da96caebf28
SHA256 b04ea6590bea03a505f5f28acf611adfe2141d28ca93b803a0c5c115cad6f8a2
SHA512 aa8ea2e1ef91e452f8f9feb6485305be706e093483cbb6f53293cbae9af2b8f57a8d1b02ed1d196e2ed565655b635db564a9b4f1785de8f47899779fa5e1737b

/data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/base.apk.classes1.zip

/data/user/0/com.coekfvmv.emkmads/shared_prefs/pref_name_setting.xml

MD5 110836573567c41f1405de8c1317dcbe
SHA1 8cdd02990ab9857f35208d265b9ab5e2f086e06e
SHA256 f006424a568473d947671477cb06de53d1654c74d9af639e2b1348dfc1a7c9c3
SHA512 88d161e1ec8ba553a0f006f677f05faf2da479143e21316dbb38305f3766ef580eab837dc47540bb3ef4cf5119f1e439dbcd5b29d553aff6b2317d8adbfe6952

/data/user/0/com.coekfvmv.emkmads/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e

Analysis: behavioral2

Detonation Overview

Submitted

2021-09-04 21:59

Reported

2021-09-04 22:00

Platform

android-x64-arm64

Max time kernel

3000242s

Max time network

44s

Command Line

com.coekfvmv.emkmads

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Reads name of network operator

Description Indicator Process Target
Framework API call android.telephony.TelephonyManager.getNetworkOperatorName N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.coekfvmv.emkmads

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:853 tcp
US 1.1.1.1:853 tcp
US 216.58.212.202:443 tcp
US 172.217.168.228:443 udp
US 216.239.35.8:123 time.android.com udp
US 216.58.212.202:443 udp
US 216.58.212.202:443 udp
US 172.217.169.46:443 udp
US 142.250.180.8:443 tcp
US 208.95.112.1:80 ip-api.com tcp
US 185.199.111.133:443 tcp

Files

/data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/tmp-base.apk.classes6968811930373844089.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 c09c2a5132b07eab58d421dc9586ec01
SHA1 a91e000405e7b518d08a8947b873a72e88b3fe58
SHA256 bc09312915732bd546046eaa5fc616dace7ed2c6d70072b661109acbc5d65d0f
SHA512 7a04fada978c605bccf2a245b1ec31524aced5df62f8caca88a7851ad0a5aba91eed05c29c49f91ca5f3bb5259a856c2752dab7538985f528148ab414a9dc589

/data/user/0/com.coekfvmv.emkmads/shared_prefs/multidex.version.xml

MD5 eb98d380c918c46193b1dd041f7015c1
SHA1 7ecd01f943c8f7593fa2c93c856f5a25b50de63e
SHA256 db8b437104e8a7dddecb8340581c002d87157341607fc1e6d37b35a7dac559da
SHA512 032bb42bce169a0506e28d78adfc03c75a9b7716fde495de8d98b29e2cffe88e398aee63bbc577c63d4151c721c9757bb8f549c286d6cc45e3a5044323101be3

/data/user/0/com.coekfvmv.emkmads/shared_prefs/pref_name_setting.xml

MD5 c12f3ac96fe955711ea9a913f37cb82b
SHA1 8e381b08c3beba5ec81e880b90cab20a4964c6de
SHA256 5abf675b8a388a71bb8734fab12ea3582e1dfbf8fc5aad18280ccd8d03b75d51
SHA512 b6f39dabb8c3deab86c69a4d2de0eb0099bbfdc489be8ca81d1d5a7fef8bb9443aac960de11924807668a7bc653205dc397201480536394a9dfcf5abd3666f51

/data/user/0/com.coekfvmv.emkmads/shared_prefs/prefs30.xml

MD5 1c6b6a6a91f2ccf7ac553f9a439ad69e
SHA1 270b45bc1c3255f95fecf8bfa85f7dbfc8fb5748
SHA256 a7958ee3107cac53056bac67328f317cf9e3aaf4533e1072f0c4f0334ebbffa6
SHA512 8a61fcab1bc82977f72af693d4a749ad41df81a9a9c6eaafee0f4ffd36a34f069a259c6b20046a8bce58a6eab526df122cb82e8d093be73cf5ff9d41e489bf8e

/data/user/0/com.coekfvmv.emkmads/shared_prefs/pref_name_setting.xml

MD5 59d28015902fbe128ff37dafc815e9cf
SHA1 2a4dae8547c50dacda30c256ed154fe7f23f1d14
SHA256 cbea02b3624a2c14f9537d2cee3d75a6b5e84fc7d31d24b86da2054e21c2d259
SHA512 0c01fffffbff6181cb085a168e1fb72a8c3d7b5a2429ca19298b7d444a81e1deea61cc4c0dd51914150e8480d81e8c28c794a49bdcad80a451d7189b09c107e2

Analysis: behavioral3

Detonation Overview

Submitted

2021-09-04 21:59

Reported

2021-09-04 22:00

Platform

android-x64

Max time kernel

3000234s

Max time network

37s

Command Line

com.coekfvmv.emkmads

Signatures

Hydra

banker trojan infostealer hydra

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Requests enabling of the accessibility settings.

Description Indicator Process Target
Intent action android.settings.ACCESSIBILITY_SETTINGS N/A N/A

Reads name of network operator

Description Indicator Process Target
Framework API call android.telephony.TelephonyManager.getNetworkOperatorName N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

com.coekfvmv.emkmads

Network

Country Destination Domain Proto
US 1.1.1.1:853 tcp
US 216.239.35.0:123 time.android.com udp
US 1.1.1.1:853 tcp
US 208.95.112.1:80 ip-api.com tcp
US 185.199.111.133:443 tcp
SE 178.132.78.156:80 kerrihuffman1237.online tcp
SE 178.132.78.156:80 kerrihuffman1237.online tcp

Files

/data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/tmp-base.apk.classes694264577993863140.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.coekfvmv.emkmads/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 dc0a11ea578bfa1485d53d049cd23c6e
SHA1 1400e5ddd7fde870bcfa87891a2fb1875f0f88fd
SHA256 b2c834d600968dbec8e76f201cb4c27e7bb69ca0c27288ecc6a11506bf35deb2
SHA512 5b04b7dbde52db9a98478499dc09fe28e1bf8a4105e10073a136f9d122562160e2767afe375a9176816a20145155526d6c75ac44fe8027d8a9b773838e8c92a6

/data/user/0/com.coekfvmv.emkmads/shared_prefs/multidex.version.xml

MD5 4dc4c3740bb244ffe272f75eb7adb09c
SHA1 4a56c764e8a1ac787c22da9bbf1bf2ede1e2d27a
SHA256 f58a6f1b1eba6f1877404a782bad5e30be8730620b7fadc983e28837dbb55896
SHA512 c2250b20be2be52d4fc564c1471484a1bd2581f2d2f1eb2855a3f151cc145029593d66b4264191059220bd4d3be6d1df37d6f9e21fc8770c455dcd90fefb14ee

/data/user/0/com.coekfvmv.emkmads/shared_prefs/pref_name_setting.xml

MD5 2b0bee3b9f102974c8c94acd66f52b13
SHA1 dfef4e6fa99203ffaa5e05e5611f21fcd9038e2a
SHA256 5f3992116c74d610252cdc5b09f656f40cab7cff6db3507e48db829cc6245e4f
SHA512 7c99de6bf248f676e5bccea3a0e4f82b7e44fd1ee74a03c3c13588da60efaf1dbc9fb9dc1746c4fca0d1f1ce3cebf258b7518746cc3466f0423695829da87ad1

/data/user/0/com.coekfvmv.emkmads/shared_prefs/prefs30.xml

MD5 12d6ab1d27552f5788e1667ec0eb1360
SHA1 f0c1a775a55b7bb45fe65579b526cf4360c0c4d6
SHA256 52e178aa40fd1c71b3a4e8fdfb73fba744ac754430d94697f4d2aaa6823c0d18
SHA512 87eb0dba3f5fbb8801a5b8a07849c8634698d64333f77d548f4596221d2f3d7cba7288ebb0fe0b7f9357add2636b07c6e9cd24aa887dd6cce6d22a1b7e2d3d32

/data/user/0/com.coekfvmv.emkmads/shared_prefs/pref_name_setting.xml

MD5 20c771df0e3b6f458e974073f9940265
SHA1 70c64233bd8eec0dff2022930086cfe043c4fcaf
SHA256 78736f95c28d6192baecc1dadeff69c3e4798b3a4f46921415ba042706411379
SHA512 125ccab23754c63d5bb8fc20a62ade781c654daf5a3a62d8d2e60dda2d4457618dc917b380a832dd728bb4ad4f92587fb2ead14f9361d7ecd468e55decf762f4

/data/user/0/com.coekfvmv.emkmads/shared_prefs/pref_name_setting.xml

MD5 9c3f2fdd94abc0ecfb6bf6c740b74223
SHA1 19b9927cc84e77d6b3a2f2244c21b2d0b976c951
SHA256 e049ac1b14bad147ecd3f43d609053087116ca287e1e7d7819708d2b7f3bb68d
SHA512 9d8cab70935c273d4da378ed834931e7bda369f1c22be7d6a8894f2a9c11634d192c2db38589427bdef0e9996561c2650651769693168b24dec6f6daa074d907

/data/user/0/com.coekfvmv.emkmads/shared_prefs/prefs30.xml

MD5 e019bcf7d0a40cf2c2683ad78aceaa46
SHA1 5efe2f7866e4ef6ee10d1162a9abee52896f0063
SHA256 81870b3cb6496af6490dc493a0df888e99364eaa7127b60560850020d29476bd
SHA512 a07e93bcb0750c08d08ee98aaca8729954c69390c4a6dcfeee4f0428e059914994f393723c9fac4d0da89afbf25cfc8e6691fed738ef20b655d97ccdf2976dd6

/data/user/0/com.coekfvmv.emkmads/shared_prefs/pref_name_setting.xml

MD5 27dbc88aa84fe89b950171dab2903955
SHA1 a43a18f24b8eaba6565ed2d2aa46f217f7f652b1
SHA256 873500175635720cc52fbf3256538e12d8c0fe3c798d242c581cf6ac8a2f6d19
SHA512 5df90e04cfc2167392fe2fe4f8be4db1b671baab0f965094d348f94cde706d7d07ea18e6837e517582053201d991d46fa5744092ba8430370584a80d1866b89b