General

  • Target

    749ba6d1f5237cffdf7ad7e8386629c730472e1bad704229c01c5635015db0b4

  • Size

    3.0MB

  • Sample

    220521-nkn33sghgp

  • MD5

    fe06e2f15f943b03b0b9d86c4df6c24f

  • SHA1

    2ab4126a150e20c788225efa8f1e59ea881a88b2

  • SHA256

    749ba6d1f5237cffdf7ad7e8386629c730472e1bad704229c01c5635015db0b4

  • SHA512

    4c10b89d2b597c00d2ae47d63656f63d98a9e1ebfa746fe77a7279b55ba96eb69de407075e8592e73687b456cc62eab8b5fa60a40f1b40731cad89d5bd2d9722

Malware Config

Targets

    • Target

      749ba6d1f5237cffdf7ad7e8386629c730472e1bad704229c01c5635015db0b4

    • Size

      3.0MB

    • MD5

      fe06e2f15f943b03b0b9d86c4df6c24f

    • SHA1

      2ab4126a150e20c788225efa8f1e59ea881a88b2

    • SHA256

      749ba6d1f5237cffdf7ad7e8386629c730472e1bad704229c01c5635015db0b4

    • SHA512

      4c10b89d2b597c00d2ae47d63656f63d98a9e1ebfa746fe77a7279b55ba96eb69de407075e8592e73687b456cc62eab8b5fa60a40f1b40731cad89d5bd2d9722

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks