Analysis

  • max time kernel
    3887622s
  • max time network
    31s
  • platform
    android_x86_64
  • resource
    android-x86-avd2
  • submitted
    13-08-2020 12:07

General

  • Target

    0e33a0200df97e40d691d6f57749ac9584652f832c28fd8ad017154b5f9db2b3.apk

  • Size

    5.3MB

  • MD5

    b35433e70c0e1db86caecef39a2dd7ed

  • SHA1

    86a66462090f01e42fed28a70c9b34035ea6bec8

  • SHA256

    0e33a0200df97e40d691d6f57749ac9584652f832c28fd8ad017154b5f9db2b3

  • SHA512

    d880d1fb2433c9c6310779deee1cdcca525176cc551c4cb55044caf7bf1e80d82aba9eb4d171ca1a27b11fa54cf7b8775b88d6eeabe3da090bc65b4733c230e7

Malware Config

Extracted

Family

anubis

C2

http://ktosdelaetskrintotpidor.com

http://sositehuypidarasi.com

Signatures

  • Anubis banker

    Android banker that uses overlays.

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Suspicious use of android.app.ActivityManager.getRunningServices 7 IoCs
  • Suspicious use of android.os.PowerManager$WakeLock.acquire 1 IoCs
  • Uses reflection 132 IoCs

Processes

  • com.mwurawatnafa.ryvrlda
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Suspicious use of android.app.ActivityManager.getRunningServices
    • Suspicious use of android.os.PowerManager$WakeLock.acquire
    • Uses reflection
    PID:5188

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads