Analysis
-
max time kernel
147s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
06-12-2024 19:33
Static task
static1
Behavioral task
behavioral1
Sample
cea98484826ce63b72d6efce2f692273_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
cea98484826ce63b72d6efce2f692273_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
cea98484826ce63b72d6efce2f692273_JaffaCakes118.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
cea98484826ce63b72d6efce2f692273_JaffaCakes118.apk
-
Size
3.0MB
-
MD5
cea98484826ce63b72d6efce2f692273
-
SHA1
0630dfd3cd0bce10bbe3fd232592bba63a97c59b
-
SHA256
c404340baa0e1322364c75898e7ffefcabb660bab01979c22ebd98a502bb2310
-
SHA512
91b96d0c0c2f7ab6e298a7b48104f444e5617362a2155153545dc39e4ecda56f13d0f1709d8a6c541ee529cee6e6b82c362d25663603161521185cdee1071010
-
SSDEEP
49152:6nn2yqlmunxjxIkdREbREIr7kN7TRcBWJ0D4MTzWdW/SQJbDB4y6+Xn565O4b4Y5:6n3LkNZdFJhRcQJWqW/pJbvXkbN
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.qfbpgpng.xosjjkk/code_cache/secondary-dexes/base.apk.classes1.zip 4800 com.qfbpgpng.xosjjkk -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.qfbpgpng.xosjjkk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.qfbpgpng.xosjjkk -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 ip-api.com -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.qfbpgpng.xosjjkk -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.qfbpgpng.xosjjkk -
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
902KB
MD56d4c8d4b9b4cb486fb3dc301c70c9466
SHA1ef4f85eb783d561719cbcac03bd0f2a57f9dd118
SHA256fc85a4a2eb31593dfbbb5d379b6e0c8b91817c1c822078cffaf2718ed2bf6df1
SHA512595d04999136900d9187f0b73cf1185fe2a64a4c989c2491f7100799b4ce98c43390aa1bf12c503f98f471177364c21240eee205e9ba7be3733742d5e907d146
-
/data/user/0/com.qfbpgpng.xosjjkk/code_cache/secondary-dexes/tmp-base.apk.classes4493062226287511860.zip
Filesize378KB
MD5e561110f38c040bb42b9833135d483e7
SHA16fe8b80ec5454d89b8b222947b6fdd9b18df9648
SHA2563a12930596e80981b68528e787b51ebfd86135d08825f03d4a954a8badbae766
SHA51241e06731fd3081c01207cbe3f6e67c6baa2209cd39355743b28fba60b27c7c0e8dab23368854cbd848fbda46769d90ce67562d300dc5fa438afb775869f234c1