Analysis

  • max time kernel
    12s
  • max time network
    102s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    13-08-2024 16:20

General

  • Target

    93d5a3d3115b514fedf7eac4b3e7f798_JaffaCakes118.apk

  • Size

    2.4MB

  • MD5

    93d5a3d3115b514fedf7eac4b3e7f798

  • SHA1

    2089c90240fda961676bb9b6425d11ec2818bf44

  • SHA256

    784d7899e33b6cb229556dd19d2aa8090df59c8441e520c6c1d5f648ace2a55f

  • SHA512

    3c49a97eac70025be87f64e4f702ba4622173289fdefe2416697cea880205b847697b66665e412e6b83650cf7e1510697f215de4607624e534d377bc89b50211

  • SSDEEP

    49152:19/7TbwQYwkXYIOlcKK6wYYjTDHJopPzQ+p8kO:Dbx0XucbxTD6pPfw

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 1 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests enabling of the accessibility settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs

Processes

  • com.mhuilevmhq.kfzvcjpjml
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    • Requests enabling of the accessibility settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    PID:4249
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mhuilevmhq.kfzvcjpjml/app_offline/rvwzcio.jar --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.mhuilevmhq.kfzvcjpjml/app_offline/oat/x86/rvwzcio.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4274

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.mhuilevmhq.kfzvcjpjml/app_offline/rvwzcio.jar

    Filesize

    252KB

    MD5

    c24ec18ec8bc29ecae84120637e3e336

    SHA1

    667821e40f5d125936725379a4268a3f0ad333c8

    SHA256

    7a119c5ffc2bbff64c7fc7b15951c3bae96078726af78e1a8519b94ed76b8c5b

    SHA512

    6fa5062a64540950ba55624e2fbe3b0ecdc3331ea615e8385d7916b138009a63208a3558162b9955127338cd3ac2e0c85c3d0e6b7c03c3533e2b16f5e13d1c9b

  • /data/user/0/com.mhuilevmhq.kfzvcjpjml/app_offline/rvwzcio.jar

    Filesize

    568KB

    MD5

    b242ce0b2a73b2ac60d54062e535400f

    SHA1

    22fe6f7d2a0d421ff8ac9e164f45dd5f5935fcbd

    SHA256

    c0d4f387b700106440fb9fa18ab51f6a879460383d203dbae59aa28faf0e37e0

    SHA512

    31682340daf06bb422b2649908fb4b9a20af7ba5abafc55ac0048e0cdd3496575f51dc226ca0431acdfa8c7395422ac580a0bfc99da56b569c214c618f3bebb5

  • /data/user/0/com.mhuilevmhq.kfzvcjpjml/app_offline/rvwzcio.jar

    Filesize

    568KB

    MD5

    aedb592be8985dd698ef7fbc8e764070

    SHA1

    89dc8aed06020d9a8c1659da492916e320ab8452

    SHA256

    e212885f20ddf618558b22a72533aed2c57f5e9f0798e1d8a04a3b3d90c1497a

    SHA512

    2a0ec9fc8475ae0bc9c9d93ab3cab0b77cf3b2f3dddfcd38a56a934800f4a67846fe28b6c262874d7b8d7396b75239427826078e97f772e61b80ea1b6c5a9465