General

  • Target

    540f2fea12850eb21e4b190286581a02250782f2febd6a7689a344edb8ce71fa

  • Size

    3.3MB

  • Sample

    220521-xdf9bsegfm

  • MD5

    2d827db9557250e275102eeb2cf98b92

  • SHA1

    8bf0d90029f41487a30524aefb8129a6c4f72cac

  • SHA256

    540f2fea12850eb21e4b190286581a02250782f2febd6a7689a344edb8ce71fa

  • SHA512

    cb9ba045de274ce211ecb926e6524c1d57644b952dc4b976709ff3d8208c0b6d667b0e0835a78652d74456e8aa4e68293ac03e6ccc6fd976944a60f95ee6edf1

Malware Config

Targets

    • Target

      540f2fea12850eb21e4b190286581a02250782f2febd6a7689a344edb8ce71fa

    • Size

      3.3MB

    • MD5

      2d827db9557250e275102eeb2cf98b92

    • SHA1

      8bf0d90029f41487a30524aefb8129a6c4f72cac

    • SHA256

      540f2fea12850eb21e4b190286581a02250782f2febd6a7689a344edb8ce71fa

    • SHA512

      cb9ba045de274ce211ecb926e6524c1d57644b952dc4b976709ff3d8208c0b6d667b0e0835a78652d74456e8aa4e68293ac03e6ccc6fd976944a60f95ee6edf1

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks