General

  • Target

    JaffaCakes118_d6fabd6517729b26751e23dfa4c9ec60

  • Size

    8.4MB

  • Sample

    250110-bhny3synfp

  • MD5

    d6fabd6517729b26751e23dfa4c9ec60

  • SHA1

    5b9025a269bb5131757ca5b6bb80410c0edc68d9

  • SHA256

    4e88ad99d9d23fec0a1e3dcb508639c637f44099dbf099fef563b0bdce3db12d

  • SHA512

    8182823c2a27c630f7fe64862abf8a436468250e8fb1d70a75199f11ecd47f60ef3330aba02e74d69b4db1c8606fcb58b9dde9949feb137dd89dfecdd41d080c

  • SSDEEP

    196608:mxoNyHUeAjc1CbFM/usyNYHmEDWx0RiQdyjynFAL91:m/0jjcAbFM/N2YHmwWabyj401

Malware Config

Targets

    • Target

      JaffaCakes118_d6fabd6517729b26751e23dfa4c9ec60

    • Size

      8.4MB

    • MD5

      d6fabd6517729b26751e23dfa4c9ec60

    • SHA1

      5b9025a269bb5131757ca5b6bb80410c0edc68d9

    • SHA256

      4e88ad99d9d23fec0a1e3dcb508639c637f44099dbf099fef563b0bdce3db12d

    • SHA512

      8182823c2a27c630f7fe64862abf8a436468250e8fb1d70a75199f11ecd47f60ef3330aba02e74d69b4db1c8606fcb58b9dde9949feb137dd89dfecdd41d080c

    • SSDEEP

      196608:mxoNyHUeAjc1CbFM/usyNYHmEDWx0RiQdyjynFAL91:m/0jjcAbFM/N2YHmwWabyj401

    • Hydra

      Android banker and info stealer.

    • Hydra family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks