General

  • Target

    ad53ff0a6090ab4904bc589ebbf64bb0_JaffaCakes118

  • Size

    8.4MB

  • Sample

    240404-c4n2msch58

  • MD5

    ad53ff0a6090ab4904bc589ebbf64bb0

  • SHA1

    4caa507ad88af628be9d5e53a4dcbfba34c4351e

  • SHA256

    3154684c4192a1ae7a00f9f61d3024e2d25a85508c512094a771f878c3130848

  • SHA512

    df103e1d1ba138b6a87dd4c10c9de954db2732627d32ff3cbb821ee87cbfcbbc52b3123070bd3304f6f595f064fb28b581694788191ff6ec8371e11be40067b3

  • SSDEEP

    196608:k1aEShpFlM17N317z391qgpyNP6QDWx0RiQdyjynFAL9mTO:k1ahnHM17pFz3DBp2P6cWabyj40IO

Malware Config

Targets

    • Target

      ad53ff0a6090ab4904bc589ebbf64bb0_JaffaCakes118

    • Size

      8.4MB

    • MD5

      ad53ff0a6090ab4904bc589ebbf64bb0

    • SHA1

      4caa507ad88af628be9d5e53a4dcbfba34c4351e

    • SHA256

      3154684c4192a1ae7a00f9f61d3024e2d25a85508c512094a771f878c3130848

    • SHA512

      df103e1d1ba138b6a87dd4c10c9de954db2732627d32ff3cbb821ee87cbfcbbc52b3123070bd3304f6f595f064fb28b581694788191ff6ec8371e11be40067b3

    • SSDEEP

      196608:k1aEShpFlM17N317z391qgpyNP6QDWx0RiQdyjynFAL9mTO:k1ahnHM17pFz3DBp2P6cWabyj40IO

    • Hydra

      Android banker and info stealer.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks