General

  • Target

    fbdd68d32dc9d2d77cd723a56438eb8a6e4ae4de106ede880aeb9250e3a44c29

  • Size

    3.1MB

  • Sample

    220521-xc32psegdp

  • MD5

    37194955ac27f19278c35ca8466b9821

  • SHA1

    7a641143f7a77f4ad56eb333c4224bb1199d3f25

  • SHA256

    fbdd68d32dc9d2d77cd723a56438eb8a6e4ae4de106ede880aeb9250e3a44c29

  • SHA512

    e1a39ffa5ca61f97ce0ab86186054bc64e0bede1329942c730abfd41ed871487e82334350a1399fc9c32f14f2319b403da1faa9f1fa17612a1cff56ce1d644f2

Malware Config

Targets

    • Target

      fbdd68d32dc9d2d77cd723a56438eb8a6e4ae4de106ede880aeb9250e3a44c29

    • Size

      3.1MB

    • MD5

      37194955ac27f19278c35ca8466b9821

    • SHA1

      7a641143f7a77f4ad56eb333c4224bb1199d3f25

    • SHA256

      fbdd68d32dc9d2d77cd723a56438eb8a6e4ae4de106ede880aeb9250e3a44c29

    • SHA512

      e1a39ffa5ca61f97ce0ab86186054bc64e0bede1329942c730abfd41ed871487e82334350a1399fc9c32f14f2319b403da1faa9f1fa17612a1cff56ce1d644f2

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks