Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    15-12-2024 05:53

General

  • Target

    f2979157677fc7d394eebf9274546651_JaffaCakes118.apk

  • Size

    3.1MB

  • MD5

    f2979157677fc7d394eebf9274546651

  • SHA1

    d8bab05fb8bb87a72a6fd699b1283d4939242ee8

  • SHA256

    a8c9c4f38f72cf8cd3cd819936f1c1ea9670541ded180327f7b096a3370f2186

  • SHA512

    4527f0905e04780ac8b1a5feb34c2e76010f89566f5507a4bbf7cf45e0f6c735caddbd8ce4d66573c2e06162c4adf42123c009bbc52fe1693983e0dca3946623

  • SSDEEP

    98304:vGYQyg+2RD7fCqx+wDbgHpADqYfanqgDlZIK:vGYTgRK4gJKqYSnvhOK

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Hydra family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs

Processes

  • com.orkpykqr.voqdvnd
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    PID:4325
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.orkpykqr.voqdvnd/code_cache/secondary-dexes/base.apk.classes1.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.orkpykqr.voqdvnd/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4354

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.orkpykqr.voqdvnd/code_cache/secondary-dexes/tmp-base.apk.classes4573165401855550259.zip

    Filesize

    378KB

    MD5

    5c93601a15b02a435d3f7f7deaf846a8

    SHA1

    ef48c690448a842a0d85245359366233173b96f6

    SHA256

    7acf0e6b67851e50ceb9e3211ed336cf3bcd6dd70655f82aa4b0dc9181c00de6

    SHA512

    7e8887ac9db1801b636a2a81a72e55b45e5d4e4e21b77b393027961060ebe413e28e62d0aafcdfd714da690a28503538ddf1383dff0ce327d9f3043d423ef0cb

  • /data/user/0/com.orkpykqr.voqdvnd/code_cache/secondary-dexes/base.apk.classes1.zip

    Filesize

    902KB

    MD5

    d5c02ddb9be8d789c23deb87af65f46c

    SHA1

    0529ff695af1a475067172e2a9733ff96dca7b75

    SHA256

    354d35e6dd7266c360f34526560f528c0788e5cd40e48e159f5936b8bf9fa954

    SHA512

    a8290275213f7977394c25bfec8fb65591651ef9e7e6a857fb10fa38924cc570f515a1c51f8cfe4865ba93f7f2f19be46e614788560bcdadd4f88553937cf67b

  • /data/user/0/com.orkpykqr.voqdvnd/code_cache/secondary-dexes/base.apk.classes1.zip

    Filesize

    902KB

    MD5

    c8828addadb43ee1b07e4a83a414eeb9

    SHA1

    cdc3541d41fb5ec96e2a40d4c59d5b8bc8d8f3fa

    SHA256

    3d03749fe7386b7a668f17b0997caba8637e780fa1b1eeefc6f9faf9592545bc

    SHA512

    a30f057d86ed3893336c5aae922fcd50789619c52052d49b046c6e3b81158e3205daf79238f743c31a0adc242a02b9a5965bf5a95e4e932c0e61d2f94ef9a7bd