General

  • Target

    0b1c0ff2a98a57fa9ced149762b8fb9c_JaffaCakes118

  • Size

    3.0MB

  • Sample

    241002-rrhresvbrb

  • MD5

    0b1c0ff2a98a57fa9ced149762b8fb9c

  • SHA1

    3b184ddb11435dcb5d3f5de724c0718d0ecfc859

  • SHA256

    f3461634486f4177f1dd18f89a06ca6a8c5bdf829604c15ecda2fa51c6a88c95

  • SHA512

    73f256c581cef280938a09d34ad2bd511fcec8d354d3dacb1d855ccdba15efeec97b4bdf1acd24168d57733ede7a8947b8762377f563b14c8612383838cb9963

  • SSDEEP

    49152:YbuRuQUJjM9UhqBJbujHzieFSR+GFJnSyyNYN4of6zujiHWsWcHeX5KoIoE7bD:Yq4QUJc/buH64GWOrIWsWcH8t58

Malware Config

Targets

    • Target

      0b1c0ff2a98a57fa9ced149762b8fb9c_JaffaCakes118

    • Size

      3.0MB

    • MD5

      0b1c0ff2a98a57fa9ced149762b8fb9c

    • SHA1

      3b184ddb11435dcb5d3f5de724c0718d0ecfc859

    • SHA256

      f3461634486f4177f1dd18f89a06ca6a8c5bdf829604c15ecda2fa51c6a88c95

    • SHA512

      73f256c581cef280938a09d34ad2bd511fcec8d354d3dacb1d855ccdba15efeec97b4bdf1acd24168d57733ede7a8947b8762377f563b14c8612383838cb9963

    • SSDEEP

      49152:YbuRuQUJjM9UhqBJbujHzieFSR+GFJnSyyNYN4of6zujiHWsWcHeX5KoIoE7bD:Yq4QUJc/buH64GWOrIWsWcH8t58

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks