General

  • Target

    5557bc7744bf58f6acf6331c4e82e6bd61396a28d764dc45602f4d7b9af2c971

  • Size

    4.0MB

  • Sample

    210420-8d3wbrhyf2

  • MD5

    08026567e556b15bc73b994d2e62e54b

  • SHA1

    287c7a28b62a4f0a1fc0cb1cdc84d591149bdc08

  • SHA256

    5557bc7744bf58f6acf6331c4e82e6bd61396a28d764dc45602f4d7b9af2c971

  • SHA512

    0c35fcf6486bf0162fc352aaf8f026a1efee55dfa5ec7eefa78d671a037bd2ada34168383035a4fe0b02e5917378b9fcc0898088de80a2e40c828808e8ef29d2

Malware Config

Extracted

Family

anubis

C2

http://ktosdelaetskrintotpidor.com

http://sositehuypidarasi.com

Targets

    • Target

      5557bc7744bf58f6acf6331c4e82e6bd61396a28d764dc45602f4d7b9af2c971

    • Size

      4.0MB

    • MD5

      08026567e556b15bc73b994d2e62e54b

    • SHA1

      287c7a28b62a4f0a1fc0cb1cdc84d591149bdc08

    • SHA256

      5557bc7744bf58f6acf6331c4e82e6bd61396a28d764dc45602f4d7b9af2c971

    • SHA512

      0c35fcf6486bf0162fc352aaf8f026a1efee55dfa5ec7eefa78d671a037bd2ada34168383035a4fe0b02e5917378b9fcc0898088de80a2e40c828808e8ef29d2

    • Anubis banker

      Android banker that uses overlays.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks