General

  • Target

    15b4782c63597ddda6b6b14a67e04078d922e1119e5b5a9d8e766d7328ac4fe9

  • Size

    3.1MB

  • Sample

    220521-nln5gahaaq

  • MD5

    d4ffb660368d7bb7be0093a71e849f9b

  • SHA1

    871038a073aa7dc92f0d7945942136ac590e6914

  • SHA256

    15b4782c63597ddda6b6b14a67e04078d922e1119e5b5a9d8e766d7328ac4fe9

  • SHA512

    bf7147600f058c73dcb1485ac17b9749d61b9da8017ef369bdb0d040ffb8c96980a5360c83dd56f14223b0456fbb7559eb2d65894340eeb50985021b87a2d217

Malware Config

Targets

    • Target

      15b4782c63597ddda6b6b14a67e04078d922e1119e5b5a9d8e766d7328ac4fe9

    • Size

      3.1MB

    • MD5

      d4ffb660368d7bb7be0093a71e849f9b

    • SHA1

      871038a073aa7dc92f0d7945942136ac590e6914

    • SHA256

      15b4782c63597ddda6b6b14a67e04078d922e1119e5b5a9d8e766d7328ac4fe9

    • SHA512

      bf7147600f058c73dcb1485ac17b9749d61b9da8017ef369bdb0d040ffb8c96980a5360c83dd56f14223b0456fbb7559eb2d65894340eeb50985021b87a2d217

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks