General

  • Target

    c30d4d0ddf81bddfcfd3691026a8e5e671f42be30cdda426a62ba9b8b23b73c6

  • Size

    3.2MB

  • Sample

    220521-nj1eqadge6

  • MD5

    aabecd1bc0124ad3de6d1e51d096b3de

  • SHA1

    fd75a1a791193a28cd85b1887f45db4b9ffbae6a

  • SHA256

    c30d4d0ddf81bddfcfd3691026a8e5e671f42be30cdda426a62ba9b8b23b73c6

  • SHA512

    c409d8fa837c1d910af7045399ee82bf3dcb64daef454a46cb8f556f030ce7edf4b2265e33e208d1928083364d7fcfa738e9d88f62010b6075bf09c9a86c6cc3

Malware Config

Targets

    • Target

      c30d4d0ddf81bddfcfd3691026a8e5e671f42be30cdda426a62ba9b8b23b73c6

    • Size

      3.2MB

    • MD5

      aabecd1bc0124ad3de6d1e51d096b3de

    • SHA1

      fd75a1a791193a28cd85b1887f45db4b9ffbae6a

    • SHA256

      c30d4d0ddf81bddfcfd3691026a8e5e671f42be30cdda426a62ba9b8b23b73c6

    • SHA512

      c409d8fa837c1d910af7045399ee82bf3dcb64daef454a46cb8f556f030ce7edf4b2265e33e208d1928083364d7fcfa738e9d88f62010b6075bf09c9a86c6cc3

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks