General

  • Target

    ca1770020c59242f0af9150b044c448894576a5ab8798dec25453b10f6c34f8e

  • Size

    3.1MB

  • Sample

    220521-njywwsghfl

  • MD5

    a78a7c05d04ec279ca5cdbd6acedf3a0

  • SHA1

    48372bd84d50ac9b4342ecc0e84e1dda046c8daa

  • SHA256

    ca1770020c59242f0af9150b044c448894576a5ab8798dec25453b10f6c34f8e

  • SHA512

    b8a83001d115494aead02cf5044501470ff5659a66a6f9a219bb81ecbed7316a5fe6bfdf128f59c9565f1289c2d9dd00afa0a9dbc6432a6e507880b6886a175a

Malware Config

Targets

    • Target

      ca1770020c59242f0af9150b044c448894576a5ab8798dec25453b10f6c34f8e

    • Size

      3.1MB

    • MD5

      a78a7c05d04ec279ca5cdbd6acedf3a0

    • SHA1

      48372bd84d50ac9b4342ecc0e84e1dda046c8daa

    • SHA256

      ca1770020c59242f0af9150b044c448894576a5ab8798dec25453b10f6c34f8e

    • SHA512

      b8a83001d115494aead02cf5044501470ff5659a66a6f9a219bb81ecbed7316a5fe6bfdf128f59c9565f1289c2d9dd00afa0a9dbc6432a6e507880b6886a175a

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks