General

  • Target

    d278e59a0697412de383aba9e7f97f0ddda1ab61f18972318df67708a02d072e

  • Size

    3.1MB

  • Sample

    220521-njpcfsghep

  • MD5

    026d960c10af24e1a378ba9d13639973

  • SHA1

    b15eadca5c027254617ae7005cd3bc3418b8ed68

  • SHA256

    d278e59a0697412de383aba9e7f97f0ddda1ab61f18972318df67708a02d072e

  • SHA512

    fa45067d8e71070ac7a8212d3c58a1fc03a486bcb8f4567c38189a3323f8f38915f0c002e8c2d752176fedf2e733cb83180f38b2175e6a1b75a06ce9bd7c34e1

Malware Config

Targets

    • Target

      d278e59a0697412de383aba9e7f97f0ddda1ab61f18972318df67708a02d072e

    • Size

      3.1MB

    • MD5

      026d960c10af24e1a378ba9d13639973

    • SHA1

      b15eadca5c027254617ae7005cd3bc3418b8ed68

    • SHA256

      d278e59a0697412de383aba9e7f97f0ddda1ab61f18972318df67708a02d072e

    • SHA512

      fa45067d8e71070ac7a8212d3c58a1fc03a486bcb8f4567c38189a3323f8f38915f0c002e8c2d752176fedf2e733cb83180f38b2175e6a1b75a06ce9bd7c34e1

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks