General

  • Target

    0e33a0200df97e40d691d6f57749ac9584652f832c28fd8ad017154b5f9db2b3.apk

  • Size

    5MB

  • Sample

    200813-v3nsqe7snn

  • MD5

    b35433e70c0e1db86caecef39a2dd7ed

  • SHA1

    86a66462090f01e42fed28a70c9b34035ea6bec8

  • SHA256

    0e33a0200df97e40d691d6f57749ac9584652f832c28fd8ad017154b5f9db2b3

  • SHA512

    d880d1fb2433c9c6310779deee1cdcca525176cc551c4cb55044caf7bf1e80d82aba9eb4d171ca1a27b11fa54cf7b8775b88d6eeabe3da090bc65b4733c230e7

Malware Config

Extracted

Family

anubis

C2

http://ktosdelaetskrintotpidor.com

http://sositehuypidarasi.com

Targets

    • Target

      0e33a0200df97e40d691d6f57749ac9584652f832c28fd8ad017154b5f9db2b3.apk

    • Size

      5MB

    • MD5

      b35433e70c0e1db86caecef39a2dd7ed

    • SHA1

      86a66462090f01e42fed28a70c9b34035ea6bec8

    • SHA256

      0e33a0200df97e40d691d6f57749ac9584652f832c28fd8ad017154b5f9db2b3

    • SHA512

      d880d1fb2433c9c6310779deee1cdcca525176cc551c4cb55044caf7bf1e80d82aba9eb4d171ca1a27b11fa54cf7b8775b88d6eeabe3da090bc65b4733c230e7

    • Anubis banker

      Android banker that uses overlays.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks