eaecf34dac5bad8ac794ebdb770f088ebd921f8df343cba4ef7744c3639edf4a

General
Target

eaecf34dac5bad8ac794ebdb770f088ebd921f8df343cba4ef7744c3639edf4a

Size

3MB

Sample

220521-xc563abdh9

Score
10 /10
MD5

1d9b1291efd7ac3a2f599ed55c14aef4

SHA1

ff3f72033d921648ee5fbbe24c88c46832b16806

SHA256

eaecf34dac5bad8ac794ebdb770f088ebd921f8df343cba4ef7744c3639edf4a

SHA512

0625b1b535bbe21c96e454409c946dd8cdefc7313c2aa49eebba92d3666e1e2193774a5661c53abfa99b5ea0ddb7aa45c9fabbc96bc6c96990230258ed59f89c

Malware Config
Targets
Target

eaecf34dac5bad8ac794ebdb770f088ebd921f8df343cba4ef7744c3639edf4a

MD5

1d9b1291efd7ac3a2f599ed55c14aef4

Filesize

3MB

Score
10/10
SHA1

ff3f72033d921648ee5fbbe24c88c46832b16806

SHA256

eaecf34dac5bad8ac794ebdb770f088ebd921f8df343cba4ef7744c3639edf4a

SHA512

0625b1b535bbe21c96e454409c946dd8cdefc7313c2aa49eebba92d3666e1e2193774a5661c53abfa99b5ea0ddb7aa45c9fabbc96bc6c96990230258ed59f89c

Tags

Signatures

  • Anubis banker

    Description

    Android banker that uses overlays.

    Tags

  • Makes use of the framework's Accessibility service.

  • Acquires the wake lock.

  • Loads dropped Dex/Jar

    Description

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks