General

  • Target

    d9b427c189fbdda7c2d74cace3e5f184_JaffaCakes118

  • Size

    2.1MB

  • Sample

    240911-f7sqsavcrq

  • MD5

    d9b427c189fbdda7c2d74cace3e5f184

  • SHA1

    e11c14c65b923f2a0565398c36eaab6846739522

  • SHA256

    5c4a0458c581c9bc0a7729b01926cd7b1f6b5b58aaecb2f31f571d4ded7ee419

  • SHA512

    8160e92113549e662c89655f77afadb9736687fce2693f04e2b5e5a2787091debb3a37da9f8297fa8a6dd36be391de893150d011308fd12594624a95424f4ada

  • SSDEEP

    49152:8RWMOdwtaY1wr9VOge7sGR8WVlNMUHr+yP8vnIKFG53RsiXZsP2:8kMOgh1wr9H+s48UlNMUHiTvIUG53RsY

Malware Config

Targets

    • Target

      d9b427c189fbdda7c2d74cace3e5f184_JaffaCakes118

    • Size

      2.1MB

    • MD5

      d9b427c189fbdda7c2d74cace3e5f184

    • SHA1

      e11c14c65b923f2a0565398c36eaab6846739522

    • SHA256

      5c4a0458c581c9bc0a7729b01926cd7b1f6b5b58aaecb2f31f571d4ded7ee419

    • SHA512

      8160e92113549e662c89655f77afadb9736687fce2693f04e2b5e5a2787091debb3a37da9f8297fa8a6dd36be391de893150d011308fd12594624a95424f4ada

    • SSDEEP

      49152:8RWMOdwtaY1wr9VOge7sGR8WVlNMUHr+yP8vnIKFG53RsiXZsP2:8kMOgh1wr9H+s48UlNMUHiTvIUG53RsY

    • Hydra

      Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks