General

  • Target

    7dfa0dbea9a306d9dc333383d0368275f4ea2d38a1dc93806de318621748ad29

  • Size

    3.1MB

  • Sample

    220521-xdeeqsegfk

  • MD5

    0eeccbf85800198cc7525fab905819e3

  • SHA1

    8286fb6060891787a81d89e4a1e85e707219e95d

  • SHA256

    7dfa0dbea9a306d9dc333383d0368275f4ea2d38a1dc93806de318621748ad29

  • SHA512

    b1bf344a6ed36d913f2e47d1872752384e229a80c33b06c09dc74823aa52ed469b3d7499b2948641a9baaf305676a1b687afc479a704a951146011d04e17bfc0

Malware Config

Targets

    • Target

      7dfa0dbea9a306d9dc333383d0368275f4ea2d38a1dc93806de318621748ad29

    • Size

      3.1MB

    • MD5

      0eeccbf85800198cc7525fab905819e3

    • SHA1

      8286fb6060891787a81d89e4a1e85e707219e95d

    • SHA256

      7dfa0dbea9a306d9dc333383d0368275f4ea2d38a1dc93806de318621748ad29

    • SHA512

      b1bf344a6ed36d913f2e47d1872752384e229a80c33b06c09dc74823aa52ed469b3d7499b2948641a9baaf305676a1b687afc479a704a951146011d04e17bfc0

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks