General

  • Target

    90778874f8b6071c658cbeecc961c39e98f0b16fc598104a60ac6d012c510fcd

  • Size

    3.1MB

  • Sample

    220521-xdck5segeq

  • MD5

    3f0c98b7d6b7074627a36aff1be6ff9f

  • SHA1

    59ef89d069849dd26434a25222505410faae8551

  • SHA256

    90778874f8b6071c658cbeecc961c39e98f0b16fc598104a60ac6d012c510fcd

  • SHA512

    b991759aafdaad79e447e7d1b6451effa2ff1e92d1e3d94e07a4f1d2c54797af29c7cccde7c730e34db23d7e865fc01d6bafc18eed92bad8eae52209654a58a2

Malware Config

Targets

    • Target

      90778874f8b6071c658cbeecc961c39e98f0b16fc598104a60ac6d012c510fcd

    • Size

      3.1MB

    • MD5

      3f0c98b7d6b7074627a36aff1be6ff9f

    • SHA1

      59ef89d069849dd26434a25222505410faae8551

    • SHA256

      90778874f8b6071c658cbeecc961c39e98f0b16fc598104a60ac6d012c510fcd

    • SHA512

      b991759aafdaad79e447e7d1b6451effa2ff1e92d1e3d94e07a4f1d2c54797af29c7cccde7c730e34db23d7e865fc01d6bafc18eed92bad8eae52209654a58a2

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks