General

  • Target

    754e209f937a73b269637e3977547c94a04fe64aedd8c0e1ddc7cb9e35ec73d0

  • Size

    3.0MB

  • Sample

    220521-nklb7adgg5

  • MD5

    c2f7222d9a2c902d6a3fc1d12683b9fa

  • SHA1

    a6189c4a502bf8060443d88b6651b075bc3cad45

  • SHA256

    754e209f937a73b269637e3977547c94a04fe64aedd8c0e1ddc7cb9e35ec73d0

  • SHA512

    189e33cc59420795151a7855775e266fe9ff6113bf463b280bd4e85081d8188c3783141c7578c6b81d11f84f3366f071db3f55833273b4b4afb7e52a1a54de5e

Malware Config

Targets

    • Target

      754e209f937a73b269637e3977547c94a04fe64aedd8c0e1ddc7cb9e35ec73d0

    • Size

      3.0MB

    • MD5

      c2f7222d9a2c902d6a3fc1d12683b9fa

    • SHA1

      a6189c4a502bf8060443d88b6651b075bc3cad45

    • SHA256

      754e209f937a73b269637e3977547c94a04fe64aedd8c0e1ddc7cb9e35ec73d0

    • SHA512

      189e33cc59420795151a7855775e266fe9ff6113bf463b280bd4e85081d8188c3783141c7578c6b81d11f84f3366f071db3f55833273b4b4afb7e52a1a54de5e

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks