Analysis

  • max time kernel
    4022989s
  • max time network
    82s
  • platform
    android_x86_64
  • resource
    android-x86_64_arm64
  • submitted
    20-04-2021 14:56

General

  • Target

    5557bc7744bf58f6acf6331c4e82e6bd61396a28d764dc45602f4d7b9af2c971.apk

  • Size

    4.0MB

  • MD5

    08026567e556b15bc73b994d2e62e54b

  • SHA1

    287c7a28b62a4f0a1fc0cb1cdc84d591149bdc08

  • SHA256

    5557bc7744bf58f6acf6331c4e82e6bd61396a28d764dc45602f4d7b9af2c971

  • SHA512

    0c35fcf6486bf0162fc352aaf8f026a1efee55dfa5ec7eefa78d671a037bd2ada34168383035a4fe0b02e5917378b9fcc0898088de80a2e40c828808e8ef29d2

Malware Config

Extracted

Family

anubis

C2

http://ktosdelaetskrintotpidor.com

http://sositehuypidarasi.com

Signatures

  • Anubis banker

    Android banker that uses overlays.

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests enabling of the accessibility settings. 1 IoCs
  • Uses reflection 27 IoCs

Processes

  • oil.ride.setup
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Requests enabling of the accessibility settings.
    • Uses reflection
    PID:4418

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads