General

  • Target

    0250f02273c8d4c45d77c5a03f5c7785f46503518810a2ec4d723820881477bb

  • Size

    3.3MB

  • Sample

    220521-xdq4jaeggl

  • MD5

    8d292eeedf06ea36d80792aeefcd34b6

  • SHA1

    6edac07f2912524097218d5023954a516987b627

  • SHA256

    0250f02273c8d4c45d77c5a03f5c7785f46503518810a2ec4d723820881477bb

  • SHA512

    303f7b8f1530a46a8c576dfe8715aea8695507739f31644e60479fcdd5477a6f2765ba346255402221c18cd2c803414acdf11c6366bf1751cbf8ff00ccf17866

Malware Config

Targets

    • Target

      0250f02273c8d4c45d77c5a03f5c7785f46503518810a2ec4d723820881477bb

    • Size

      3.3MB

    • MD5

      8d292eeedf06ea36d80792aeefcd34b6

    • SHA1

      6edac07f2912524097218d5023954a516987b627

    • SHA256

      0250f02273c8d4c45d77c5a03f5c7785f46503518810a2ec4d723820881477bb

    • SHA512

      303f7b8f1530a46a8c576dfe8715aea8695507739f31644e60479fcdd5477a6f2765ba346255402221c18cd2c803414acdf11c6366bf1751cbf8ff00ccf17866

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks