General

  • Target

    716003c3056c3d8483a1fb469596b7d9_JaffaCakes118

  • Size

    3.1MB

  • Sample

    241023-3sr72axcln

  • MD5

    716003c3056c3d8483a1fb469596b7d9

  • SHA1

    cee5c812eaec44015c844718e211a162ce497f49

  • SHA256

    adca984304f23557bbab99360a86e331ac018d15c9fbdbcb286c9f7ecf2f53df

  • SHA512

    98b2b8149f0e5b45980e9439e1f1e01ec568048aad1bc08680be178b768b945ec230508dec4ff5d58e551c1a1958b3cd4ee6c044e4d3df8e17170be879d67954

  • SSDEEP

    49152:xKq+vZPoStSYCPXc8Z4jpnauk82apEUhOVZEHcafxYx0MG0fd/D51:xgoStoMBjpnHR2apEBZWc8xYxLhX

Malware Config

Targets

    • Target

      716003c3056c3d8483a1fb469596b7d9_JaffaCakes118

    • Size

      3.1MB

    • MD5

      716003c3056c3d8483a1fb469596b7d9

    • SHA1

      cee5c812eaec44015c844718e211a162ce497f49

    • SHA256

      adca984304f23557bbab99360a86e331ac018d15c9fbdbcb286c9f7ecf2f53df

    • SHA512

      98b2b8149f0e5b45980e9439e1f1e01ec568048aad1bc08680be178b768b945ec230508dec4ff5d58e551c1a1958b3cd4ee6c044e4d3df8e17170be879d67954

    • SSDEEP

      49152:xKq+vZPoStSYCPXc8Z4jpnauk82apEUhOVZEHcafxYx0MG0fd/D51:xgoStoMBjpnHR2apEBZWc8xYxLhX

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks