Analysis
-
max time kernel
149s -
max time network
137s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
17-04-2024 12:15
Static task
static1
Behavioral task
behavioral1
Sample
f5beab46dd72473a4d1cf3339ef6aecd_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
f5beab46dd72473a4d1cf3339ef6aecd_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
f5beab46dd72473a4d1cf3339ef6aecd_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral4
Sample
vk_dex.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral5
Sample
vk_dex.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral6
Sample
vk_dex.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
f5beab46dd72473a4d1cf3339ef6aecd_JaffaCakes118.apk
-
Size
3.2MB
-
MD5
f5beab46dd72473a4d1cf3339ef6aecd
-
SHA1
0c4f9b6957c583b554b2ec595eb0158b3a3ed13e
-
SHA256
fc2e4bb692325fc6c3919b3961eb74ae0852c80ff2f02d2438bc45ca9d8be0fa
-
SHA512
938e9f123531e081f93515920664f8fda645746fc3548fef72f9a4b8133da66735cd9ed6dab55b9aa8b2548f105730793c2f819a113cfa59facc4f7a3d69bd17
-
SSDEEP
98304:7Tv8nFP88EEdvvnJIgCP16rt5qiTSIqmeWNxWlzLrXR8cB4e3W3t:7TvWzJvJI50neIqmeIxKpBf3s
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mrujdeez.adisarj Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mrujdeez.adisarj -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mrujdeez.adisarj/code_cache/secondary-dexes/base.apk.classes1.zip 4185 com.mrujdeez.adisarj -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.mrujdeez.adisarj/code_cache/secondary-dexes/tmp-base.apk.classes8990332248091653094.zip
Filesize378KB
MD5c0ac7fce2dbb26c7713f3b29ebe4914b
SHA12f7d4640dedce736b7a1296bbc541616eb1e007b
SHA25689dfecfd878d2bde9774e41913706c7f1e6e6ee8e1a65d4a38d0f5923f8fa3fa
SHA512c42a03a551118078306176cfe511e77523b1a966e749e5c301ad46783f7e55fa405dc3ae3e987631093a7f90c751349edc7e921b1da1a7f901844ad96c694f0b
-
Filesize
902KB
MD53ee75470b066b4d035c61cd59d70e6b2
SHA1e3b95cb73462e9bf7bc77a7f78834f5c0453dad0
SHA2565d93597b84c7bf93a543af403b8c64e60196585df09897ddc3f371ffee39437d
SHA51272ce27008d731dba66d88a56826c95f2774ed952d154154a72c3dfe590d56e9164111f2d6753b00a6cebbe0578b148ee52c31a313d5e7697c37db1faadb83276