Analysis
-
max time kernel
149s -
max time network
148s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
18-10-2024 08:04
Static task
static1
Behavioral task
behavioral1
Sample
56520eabdbd97a436868305176e2d1ba_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
56520eabdbd97a436868305176e2d1ba_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
56520eabdbd97a436868305176e2d1ba_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
56520eabdbd97a436868305176e2d1ba_JaffaCakes118.apk
-
Size
3.0MB
-
MD5
56520eabdbd97a436868305176e2d1ba
-
SHA1
08fbc7b29cd3e9b414e81ca65b4c51ef2cf77825
-
SHA256
1c2695d5314b46ab77ff6ea879318161310d792f4e5339926bb0aa5dd5421bf6
-
SHA512
b8d84cded022bf776b9939aa3abd868eca6c4f6f532a9de2ce1e99c35e33445c519b22f0a1ee90674145371d720c67de8430d208811c936b420171ea9bcf74de
-
SSDEEP
49152:8/7yT/hx1qoB+bpbwdXe/w1arsCIauzN5t9PYUMf5MK28V4D9zwfsKt5Mt:8/+/DY++bp8dXe/w4sWCNRPYpHn0zwUF
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.drddfwrl.ajwqenv/code_cache/secondary-dexes/base.apk.classes1.zip 4995 com.drddfwrl.ajwqenv -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.drddfwrl.ajwqenv Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.drddfwrl.ajwqenv -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.drddfwrl.ajwqenv -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.drddfwrl.ajwqenv -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.drddfwrl.ajwqenv
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.drddfwrl.ajwqenv/code_cache/secondary-dexes/tmp-base.apk.classes73334452972281705.zip
Filesize377KB
MD5feba471a01c75d3b42892801d574979f
SHA110e5da7cafb8f02ca79f49de3b269fba698612a3
SHA25637bef7b3dea0d47ac0373a98c985dd02aa39478c137a436c8f5231b020e7ffcb
SHA512a143f491a1da236c402a83180072357fcd1b61d6fb362ab8969c329816518ca00c2f4bf780199a6ad7bdbe47782335eff3ce25cb7bcaa18c9063580ff258ccba
-
Filesize
902KB
MD5193858a3fddc4d48cde97c5e23067e22
SHA149b752e85fa897a861a0c58f64fd1a5c344edfea
SHA2564685cce104658324c8289cab13703ab8184209a54858cec8ba78d1738ab3a7f1
SHA5123da7831ff1277464f26dcba3fd08c9a2c9e22e7637af8422d8c1c0bf362ae4dea939453761c03d12d9973edd7fb49563e1970ff672b671b7fa39661a32fa312f