General

  • Target

    d26a33a419ddb1b0a0a42d0e98e9ffce108852aa756492d124436153e43acebd

  • Size

    3.2MB

  • Sample

    220521-njtbeagheq

  • MD5

    9c88cbcc3e33085961598cfe102374ca

  • SHA1

    15b5c78249648f68e55c93aba2a425c9531ffd37

  • SHA256

    d26a33a419ddb1b0a0a42d0e98e9ffce108852aa756492d124436153e43acebd

  • SHA512

    5984f0db77c268d14a326c4e6fba80bd24369f2277a0bdbb12ae6f5b946c8751666e9534a6d6c113537036d993932348cb3c76340de5a2f133441d12e34dd700

Malware Config

Targets

    • Target

      d26a33a419ddb1b0a0a42d0e98e9ffce108852aa756492d124436153e43acebd

    • Size

      3.2MB

    • MD5

      9c88cbcc3e33085961598cfe102374ca

    • SHA1

      15b5c78249648f68e55c93aba2a425c9531ffd37

    • SHA256

      d26a33a419ddb1b0a0a42d0e98e9ffce108852aa756492d124436153e43acebd

    • SHA512

      5984f0db77c268d14a326c4e6fba80bd24369f2277a0bdbb12ae6f5b946c8751666e9534a6d6c113537036d993932348cb3c76340de5a2f133441d12e34dd700

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks