General

  • Target

    dd35f2171e331f4195fa849f52d1c73d6e68709154a3b03188e64799a2b66e8a

  • Size

    3.2MB

  • Sample

    220521-njlxbsdge5

  • MD5

    62a8d73200b6f347e1ebe4a8e0407f21

  • SHA1

    9b32cc7b378c78a25688ece4e8c57183f9cdeb36

  • SHA256

    dd35f2171e331f4195fa849f52d1c73d6e68709154a3b03188e64799a2b66e8a

  • SHA512

    2fbad0504c2c8e531c79be09abd37b6e697ebbc5b61879047f7d3f907443780268ade70105376a63c1a747772341d5798f0c3cc285b2ab654067cb2cd4c5e819

Malware Config

Targets

    • Target

      dd35f2171e331f4195fa849f52d1c73d6e68709154a3b03188e64799a2b66e8a

    • Size

      3.2MB

    • MD5

      62a8d73200b6f347e1ebe4a8e0407f21

    • SHA1

      9b32cc7b378c78a25688ece4e8c57183f9cdeb36

    • SHA256

      dd35f2171e331f4195fa849f52d1c73d6e68709154a3b03188e64799a2b66e8a

    • SHA512

      2fbad0504c2c8e531c79be09abd37b6e697ebbc5b61879047f7d3f907443780268ade70105376a63c1a747772341d5798f0c3cc285b2ab654067cb2cd4c5e819

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks