General

  • Target

    23eb13b671d7aa413698939a68a4487b32402411c78083d3254c9da5b9934b11

  • Size

    3.2MB

  • Sample

    220521-xdmfcabeb6

  • MD5

    012fc3fde921a50fe13a8d65e5717a62

  • SHA1

    1e12f8e94538aaa09fde8b719b997fe3a0f81935

  • SHA256

    23eb13b671d7aa413698939a68a4487b32402411c78083d3254c9da5b9934b11

  • SHA512

    4a70b6aa18924488d159458c14ebafae403510166b3479d6f26c679f1d27100610150afdeca0d9faaaf2aed80c2406e4a5a7422f8b399d686bb459c5a9163711

Malware Config

Targets

    • Target

      23eb13b671d7aa413698939a68a4487b32402411c78083d3254c9da5b9934b11

    • Size

      3.2MB

    • MD5

      012fc3fde921a50fe13a8d65e5717a62

    • SHA1

      1e12f8e94538aaa09fde8b719b997fe3a0f81935

    • SHA256

      23eb13b671d7aa413698939a68a4487b32402411c78083d3254c9da5b9934b11

    • SHA512

      4a70b6aa18924488d159458c14ebafae403510166b3479d6f26c679f1d27100610150afdeca0d9faaaf2aed80c2406e4a5a7422f8b399d686bb459c5a9163711

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks