General

  • Target

    93d5a3d3115b514fedf7eac4b3e7f798_JaffaCakes118

  • Size

    2.4MB

  • Sample

    240813-ts6wraydlm

  • MD5

    93d5a3d3115b514fedf7eac4b3e7f798

  • SHA1

    2089c90240fda961676bb9b6425d11ec2818bf44

  • SHA256

    784d7899e33b6cb229556dd19d2aa8090df59c8441e520c6c1d5f648ace2a55f

  • SHA512

    3c49a97eac70025be87f64e4f702ba4622173289fdefe2416697cea880205b847697b66665e412e6b83650cf7e1510697f215de4607624e534d377bc89b50211

  • SSDEEP

    49152:19/7TbwQYwkXYIOlcKK6wYYjTDHJopPzQ+p8kO:Dbx0XucbxTD6pPfw

Malware Config

Targets

    • Target

      93d5a3d3115b514fedf7eac4b3e7f798_JaffaCakes118

    • Size

      2.4MB

    • MD5

      93d5a3d3115b514fedf7eac4b3e7f798

    • SHA1

      2089c90240fda961676bb9b6425d11ec2818bf44

    • SHA256

      784d7899e33b6cb229556dd19d2aa8090df59c8441e520c6c1d5f648ace2a55f

    • SHA512

      3c49a97eac70025be87f64e4f702ba4622173289fdefe2416697cea880205b847697b66665e412e6b83650cf7e1510697f215de4607624e534d377bc89b50211

    • SSDEEP

      49152:19/7TbwQYwkXYIOlcKK6wYYjTDHJopPzQ+p8kO:Dbx0XucbxTD6pPfw

    • Hydra

      Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks