General

  • Target

    eaecf34dac5bad8ac794ebdb770f088ebd921f8df343cba4ef7744c3639edf4a

  • Size

    3.2MB

  • Sample

    220521-xc563abdh9

  • MD5

    1d9b1291efd7ac3a2f599ed55c14aef4

  • SHA1

    ff3f72033d921648ee5fbbe24c88c46832b16806

  • SHA256

    eaecf34dac5bad8ac794ebdb770f088ebd921f8df343cba4ef7744c3639edf4a

  • SHA512

    0625b1b535bbe21c96e454409c946dd8cdefc7313c2aa49eebba92d3666e1e2193774a5661c53abfa99b5ea0ddb7aa45c9fabbc96bc6c96990230258ed59f89c

Malware Config

Targets

    • Target

      eaecf34dac5bad8ac794ebdb770f088ebd921f8df343cba4ef7744c3639edf4a

    • Size

      3.2MB

    • MD5

      1d9b1291efd7ac3a2f599ed55c14aef4

    • SHA1

      ff3f72033d921648ee5fbbe24c88c46832b16806

    • SHA256

      eaecf34dac5bad8ac794ebdb770f088ebd921f8df343cba4ef7744c3639edf4a

    • SHA512

      0625b1b535bbe21c96e454409c946dd8cdefc7313c2aa49eebba92d3666e1e2193774a5661c53abfa99b5ea0ddb7aa45c9fabbc96bc6c96990230258ed59f89c

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks