General

  • Target

    08c07dd023761e08bbda78b3ab6d13e626265c19136bfa2e4ff46b73d4a720ff

  • Size

    3.2MB

  • Sample

    220521-nlzafadhb3

  • MD5

    2f7481668c5f744aeeeeb48b2e768a7d

  • SHA1

    d8b9c3b6c4fce9584ee1577b62cfc708dbf66c86

  • SHA256

    08c07dd023761e08bbda78b3ab6d13e626265c19136bfa2e4ff46b73d4a720ff

  • SHA512

    344429c09e5e42f1164f6e54cd3f6454817bf03b3974038c33f90142ed659e1c4c4c351f188c9c40535d4c1cfcdd29fd7922b4f007ed91d5736805c2110e9910

Malware Config

Targets

    • Target

      08c07dd023761e08bbda78b3ab6d13e626265c19136bfa2e4ff46b73d4a720ff

    • Size

      3.2MB

    • MD5

      2f7481668c5f744aeeeeb48b2e768a7d

    • SHA1

      d8b9c3b6c4fce9584ee1577b62cfc708dbf66c86

    • SHA256

      08c07dd023761e08bbda78b3ab6d13e626265c19136bfa2e4ff46b73d4a720ff

    • SHA512

      344429c09e5e42f1164f6e54cd3f6454817bf03b3974038c33f90142ed659e1c4c4c351f188c9c40535d4c1cfcdd29fd7922b4f007ed91d5736805c2110e9910

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks