General

  • Target

    86bb307f9ba9c1682f51f815291af8ee_JaffaCakes118

  • Size

    8.4MB

  • Sample

    240402-jpac9sbc7s

  • MD5

    86bb307f9ba9c1682f51f815291af8ee

  • SHA1

    24186cc10edbec0acc7c3c527e7ed5148223b969

  • SHA256

    31c48d66728074af59cc9a818cff654297543bcc67fe11b17a0b22b0abd22680

  • SHA512

    57bcf4ca29ca478da7a3caf9944b31c4ff96affe00b14d569beb3a0fadfc97c3849ca84ef75b4b3044c7cbbe2d572cfa615cdfed4e5da08e6fb054352fb66a10

  • SSDEEP

    196608:ygrg8FXZ/Vicl9PwgZEyNHQwDWx0RiQdyjynFAL9G:ygrg8VFVicl5FO2HQ8Wabyj40G

Malware Config

Targets

    • Target

      86bb307f9ba9c1682f51f815291af8ee_JaffaCakes118

    • Size

      8.4MB

    • MD5

      86bb307f9ba9c1682f51f815291af8ee

    • SHA1

      24186cc10edbec0acc7c3c527e7ed5148223b969

    • SHA256

      31c48d66728074af59cc9a818cff654297543bcc67fe11b17a0b22b0abd22680

    • SHA512

      57bcf4ca29ca478da7a3caf9944b31c4ff96affe00b14d569beb3a0fadfc97c3849ca84ef75b4b3044c7cbbe2d572cfa615cdfed4e5da08e6fb054352fb66a10

    • SSDEEP

      196608:ygrg8FXZ/Vicl9PwgZEyNHQwDWx0RiQdyjynFAL9G:ygrg8VFVicl5FO2HQ8Wabyj40G

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks