General

  • Target

    b600fa379cabfd33a6ebc2e69fd71910bff442b2d90d0163ccaa997cc2199b7e

  • Size

    3.3MB

  • Sample

    220521-nj29badge9

  • MD5

    98f48dacd555fc1a4f90d69fb91ae4e8

  • SHA1

    b8aec6d580883393cba4bcfa8e41857b130fa95d

  • SHA256

    b600fa379cabfd33a6ebc2e69fd71910bff442b2d90d0163ccaa997cc2199b7e

  • SHA512

    5dde926dea76716c1a8ff19e74d2393cec02f20eea00c9d228640c74231a2934df3137c1f3fc4d465c067012f7260699a62e5d4400d0b9696807b344359716b3

Malware Config

Targets

    • Target

      b600fa379cabfd33a6ebc2e69fd71910bff442b2d90d0163ccaa997cc2199b7e

    • Size

      3.3MB

    • MD5

      98f48dacd555fc1a4f90d69fb91ae4e8

    • SHA1

      b8aec6d580883393cba4bcfa8e41857b130fa95d

    • SHA256

      b600fa379cabfd33a6ebc2e69fd71910bff442b2d90d0163ccaa997cc2199b7e

    • SHA512

      5dde926dea76716c1a8ff19e74d2393cec02f20eea00c9d228640c74231a2934df3137c1f3fc4d465c067012f7260699a62e5d4400d0b9696807b344359716b3

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks