Analysis
-
max time kernel
149s -
max time network
158s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
29-03-2024 23:48
Static task
static1
Behavioral task
behavioral1
Sample
2eb95b88fab546af95d509c94a26a930_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
2eb95b88fab546af95d509c94a26a930_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
2eb95b88fab546af95d509c94a26a930_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral4
Sample
vk_dex.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral5
Sample
vk_dex.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral6
Sample
vk_dex.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
2eb95b88fab546af95d509c94a26a930_JaffaCakes118.apk
-
Size
7.3MB
-
MD5
2eb95b88fab546af95d509c94a26a930
-
SHA1
cc0d10a420a0ec0ea3f96d89318af0ad325423d8
-
SHA256
f6da0d9f1d74f2f80cd4d69183a78ccc1b3679689419262c9704787cea754726
-
SHA512
4deabfb458934244fe84508df035430b6c8550834141d11818d73e5ff3de1123cd64bcce79cd5dee93d9d356ee05a1b474944a809cb1c4c5a2bf16bda55e97ee
-
SSDEEP
196608:83YEQjk9z5MpNelJKDWx0RiQdyjynFAL9cR3n:8nQwd5GNejeWabyj40En
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.emmtyggz.qvvtshu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.emmtyggz.qvvtshu -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.emmtyggz.qvvtshu/mzwqsyyibh/blaygywgwgiwygg/base.apk.rrehzhe1.hbz 4186 com.emmtyggz.qvvtshu -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Reads information about phone network operator. 1 TTPs
Processes
-
com.emmtyggz.qvvtshu1⤵
- Makes use of the framework's Accessibility service
- Loads dropped Dex/Jar
PID:4186 -
/system/bin/ndk_translation_program_runner_binfmt_misc /data/user/0/com.emmtyggz.qvvtshu/app_torfiles/tor /data/user/0/com.emmtyggz.qvvtshu/app_torfiles/tor -f /data/user/0/com.emmtyggz.qvvtshu/app_torfiles/torrc __OwningControllerProcess 41862⤵PID:4237
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD5da86c56d98ea812ce6ab42691e4d1197
SHA1e3c910f3b2a6c916c7be33a943091ef57048b72c
SHA2569f65eab86508224b41cbf319314c070f33fdecb250d17247da83ab7b4d436159
SHA51262095ef018a1e2664b380056141e54f224458727229b309f101b0961616a0e5feeaf8428b9b788df4a1408304a46f6d38bcaf9edda770dd6752251995ae49235
-
Filesize
2.1MB
MD518625900e4f9b58af0db8b4a621058df
SHA1e8bd5b2e6554c27f718f1222667c09680d75f799
SHA256296911c0f69a26b5fd65f4552f6a141d6cdbb5979f62b8b7db28e7b97e0698f5
SHA512347006c25eeac5b5cccecd09dafe814cec569e4741c67d3a35dc47d605ef2110adbc0a4e689077c80216059a6a66454bfa525e3cb6fe5b03a781f1f3b8fac6c8
-
Filesize
6.5MB
MD53ffe7e540a5be82f50eccd51dde09828
SHA1e3d9711da7afed4bc89326d3bf80bbfcad7dc5cc
SHA256805e8995ae913e691ff3e4b6a5fce1c7d11860940ace43a5187a1f548ddcb24b
SHA5128679cb1df0f82a830e952d0e9628967839dc7a96c178c481dac96ab01c815dec107b4f1b22aa7481aa0071bff9c541d9cb559a0a7268782e3a75874fbbaba7cc
-
Filesize
336B
MD5a4ce7625bae755c32334ec7fe4cfd943
SHA1e99af111cde5ab1187d12dcf5ac772ed50dc61a7
SHA2569f041e2db8caed07fad0168841e985e89b4c71615d97f90faa7264bf44e796fb
SHA512b1da6843ee4bd6cd732e6a270185d49cbb311621f7150c980fb8402e45347bfd6b85c062d4b583fbfa81f236d3aaae23df9a9b09cdc63efdfe147dac07329cc7
-
Filesize
99B
MD5a5537c6e54c265bd4a318bdc057b604c
SHA100e834c03f908659e5beeb57a0828b22c2d09acc
SHA256c0fbdadf36a2b1ef0b4287b66d3a94312915faf5f10b0861e494ea6c40b62c2e
SHA512062a02b944e990ae4871b53e83fdf15322140f4c50df286488dc1c7ddad423708d4c4eeb97af7518c4bdb54547ee1188822cfacd4ca3ed7032961625a251cac9
-
/data/data/com.emmtyggz.qvvtshu/mzwqsyyibh/blaygywgwgiwygg/tmp-base.apk.rrehzhe797148927311872797.hbz
Filesize538KB
MD5fa495efe41a4a9dcc2b287e68eefa494
SHA18874e72bdb035210f46e02f7c81c41bde284e084
SHA25696cfe61cd0e5b12ae35f072bf523ff063ade23ff7724ced4f9f1b16a95e2ffea
SHA5123d1a5b2d00039591ca2fef151b5bf74d7c0c13069d8a403784cdba51bad378a26b3c76eb29b4eb7222a993258d0c1d0f71a632b4df5ba27d3371ecdaa421f47a
-
Filesize
1.2MB
MD5f643c594fb381a379937be7048adc67b
SHA1ad9fe97bec868d9f2ae24ccd0dc0231a3b1e208c
SHA256d5bb6d31485cc56bbeef3ab7a9e371cecb3701ff15c30f7e9c52866fd5398c79
SHA51293482d3b7649fa147751167947e5319b6ccb821cf4b16f5d31c2b3de5193db916568f0e38061a9a1012ac757c6454067dd417063026b0f6e2c2ed9e68b391ec6