General

  • Target

    0ffdf82f55912d00705d91f90894abbbc728ecd9bad1b850c4b490f7a0796d45

  • Size

    4MB

  • Sample

    200813-s9klzhq5ka

  • MD5

    946e6fb8d3265bfbfbe405659939e511

  • SHA1

    d73aa08565792e5e5729c1639c22da5d09e2ef15

  • SHA256

    0ffdf82f55912d00705d91f90894abbbc728ecd9bad1b850c4b490f7a0796d45

  • SHA512

    8940187e330965a6c3c175760f237238087c0c9d2a3dd14ea851fde571d4769bf2099971f3f43af22a9747197f03127f290f6175fc6bdf9f20912001f6c64a6b

Malware Config

Extracted

Family

anubis

C2

http://ktosdelaetskrintotpidor.com

http://sositehuypidarasi.com

Targets

    • Target

      0ffdf82f55912d00705d91f90894abbbc728ecd9bad1b850c4b490f7a0796d45

    • Size

      4MB

    • MD5

      946e6fb8d3265bfbfbe405659939e511

    • SHA1

      d73aa08565792e5e5729c1639c22da5d09e2ef15

    • SHA256

      0ffdf82f55912d00705d91f90894abbbc728ecd9bad1b850c4b490f7a0796d45

    • SHA512

      8940187e330965a6c3c175760f237238087c0c9d2a3dd14ea851fde571d4769bf2099971f3f43af22a9747197f03127f290f6175fc6bdf9f20912001f6c64a6b

    • Anubis banker

      Android banker that uses overlays.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks