Analysis

  • max time kernel
    178s
  • max time network
    133s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    28-07-2024 01:07

General

  • Target

    04740989c14ab33a2ff2696db96d0c1f_JaffaCakes118.apk

  • Size

    4.6MB

  • MD5

    04740989c14ab33a2ff2696db96d0c1f

  • SHA1

    997b7fa513c2c6ecce1247f129da6680e8a4c97b

  • SHA256

    5cb252c70a223901b3005816ddd87a0e7e67f32bb44af63cb6dc1482f9bcd577

  • SHA512

    fa1a714626215f057007bc5759b5ba6b0108da6c08f331643322ff05195ffa0929c1be2377e612c06fe427e9c643611eb6805251ef29fe3fbacd18cdcf117a28

  • SSDEEP

    98304:21EqttcTPcM640/AB+b7n7Vg7W3vuPbqwTKCvqeMKXDDLYEfKr9:UsT0MbhB+v7p32PewTKaTzDVfKr9

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs

Processes

  • wjhtcnrkkar.lubuxqtnmzucraly.xasiafinjzlmxme
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    PID:4474

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/wjhtcnrkkar.lubuxqtnmzucraly.xasiafinjzlmxme/app_DynamicOptDex/TD.json

    Filesize

    2.7MB

    MD5

    f010ee9359c9f821774826bf6bc7455a

    SHA1

    bdff7af978ec5e7bde75e2bcd7ee61d7796d26fc

    SHA256

    563ddf7dc401b739398eb480663a0ca44c7592b189e51fe82539349ef1670f98

    SHA512

    7c4977760e5829b572d93cf4906bc86daabaa2f2f2d54b1fd83cd2eadb71b2087c8ce12c2de795ef2b8f8f38790b8b8a723d1f9e7487cbd9e104974e054c0f14

  • /data/user/0/wjhtcnrkkar.lubuxqtnmzucraly.xasiafinjzlmxme/app_DynamicOptDex/TD.json

    Filesize

    2.7MB

    MD5

    bd8a27efbb8d2a97b998e3203f746088

    SHA1

    ac6748fd08597745f5fba12dba7d34aac2885f30

    SHA256

    cb624aaa4569cdffc9f9706638a90d33a6bb180ad31cb7a9a5f238ca99e32919

    SHA512

    74ebcceda9519767dca9dc84e3d98861816c2cdbf399dcf1cecb34cc1814d615e5341bf5cd66d07a1c9d104790c1bd594452c6449970c9a6f7c0c51124593da4