Analysis
-
max time kernel
149s -
max time network
133s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
15-12-2024 05:53
Static task
static1
Behavioral task
behavioral1
Sample
f2979157677fc7d394eebf9274546651_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f2979157677fc7d394eebf9274546651_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
f2979157677fc7d394eebf9274546651_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
f2979157677fc7d394eebf9274546651_JaffaCakes118.apk
-
Size
3.1MB
-
MD5
f2979157677fc7d394eebf9274546651
-
SHA1
d8bab05fb8bb87a72a6fd699b1283d4939242ee8
-
SHA256
a8c9c4f38f72cf8cd3cd819936f1c1ea9670541ded180327f7b096a3370f2186
-
SHA512
4527f0905e04780ac8b1a5feb34c2e76010f89566f5507a4bbf7cf45e0f6c735caddbd8ce4d66573c2e06162c4adf42123c009bbc52fe1693983e0dca3946623
-
SSDEEP
98304:vGYQyg+2RD7fCqx+wDbgHpADqYfanqgDlZIK:vGYTgRK4gJKqYSnvhOK
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Hydra family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.orkpykqr.voqdvnd/code_cache/secondary-dexes/base.apk.classes1.zip 4449 com.orkpykqr.voqdvnd -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.orkpykqr.voqdvnd Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.orkpykqr.voqdvnd -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 ip-api.com -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.orkpykqr.voqdvnd -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.orkpykqr.voqdvnd -
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
902KB
MD5c8828addadb43ee1b07e4a83a414eeb9
SHA1cdc3541d41fb5ec96e2a40d4c59d5b8bc8d8f3fa
SHA2563d03749fe7386b7a668f17b0997caba8637e780fa1b1eeefc6f9faf9592545bc
SHA512a30f057d86ed3893336c5aae922fcd50789619c52052d49b046c6e3b81158e3205daf79238f743c31a0adc242a02b9a5965bf5a95e4e932c0e61d2f94ef9a7bd
-
/data/user/0/com.orkpykqr.voqdvnd/code_cache/secondary-dexes/tmp-base.apk.classes80229385026354496.zip
Filesize378KB
MD55c93601a15b02a435d3f7f7deaf846a8
SHA1ef48c690448a842a0d85245359366233173b96f6
SHA2567acf0e6b67851e50ceb9e3211ed336cf3bcd6dd70655f82aa4b0dc9181c00de6
SHA5127e8887ac9db1801b636a2a81a72e55b45e5d4e4e21b77b393027961060ebe413e28e62d0aafcdfd714da690a28503538ddf1383dff0ce327d9f3043d423ef0cb