General

  • Target

    61f7cd1c7b2b0eb8d8357e689d1815593014a6e957dfa15fa71a822c6a3eb280

  • Size

    3.1MB

  • Sample

    220521-nkxp8adgh2

  • MD5

    048efac884213e26465e74944bffffc4

  • SHA1

    101f07486682a7e01ff31fe2b5ce64caf9db8784

  • SHA256

    61f7cd1c7b2b0eb8d8357e689d1815593014a6e957dfa15fa71a822c6a3eb280

  • SHA512

    379f65554b04acc0f782bb350302fdde6d4abb2254abf0f29bcb7b90b4a70facfc1d172182d6890ec57fbad05739a2a4013fa8c768b1f717a644fab91a375d62

Malware Config

Targets

    • Target

      61f7cd1c7b2b0eb8d8357e689d1815593014a6e957dfa15fa71a822c6a3eb280

    • Size

      3.1MB

    • MD5

      048efac884213e26465e74944bffffc4

    • SHA1

      101f07486682a7e01ff31fe2b5ce64caf9db8784

    • SHA256

      61f7cd1c7b2b0eb8d8357e689d1815593014a6e957dfa15fa71a822c6a3eb280

    • SHA512

      379f65554b04acc0f782bb350302fdde6d4abb2254abf0f29bcb7b90b4a70facfc1d172182d6890ec57fbad05739a2a4013fa8c768b1f717a644fab91a375d62

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks