General

  • Target

    0496F43DCC6C2E25BBF6D05A13E72DADC2AE6397FC617C935FD865F243FFD084.apk

  • Size

    2.6MB

  • Sample

    220603-hakd9afgbr

  • MD5

    a1ba897aa937f4fde94652df43432935

  • SHA1

    272b2d9ca67d158d6f2a4635e52593e1d26838a7

  • SHA256

    0496f43dcc6c2e25bbf6d05a13e72dadc2ae6397fc617c935fd865f243ffd084

  • SHA512

    f4befd822b80ca631a648070683923013328755c912ff5623c0dc6b562dc12f1cd55d7a5de95d8c88f884c9f6bf435b0364c7b19d4b6f5737c46bd35e1b06498

Malware Config

Extracted

Family

anubis

C2

http://92.42.45.152/

Targets

    • Target

      0496F43DCC6C2E25BBF6D05A13E72DADC2AE6397FC617C935FD865F243FFD084.apk

    • Size

      2.6MB

    • MD5

      a1ba897aa937f4fde94652df43432935

    • SHA1

      272b2d9ca67d158d6f2a4635e52593e1d26838a7

    • SHA256

      0496f43dcc6c2e25bbf6d05a13e72dadc2ae6397fc617c935fd865f243ffd084

    • SHA512

      f4befd822b80ca631a648070683923013328755c912ff5623c0dc6b562dc12f1cd55d7a5de95d8c88f884c9f6bf435b0364c7b19d4b6f5737c46bd35e1b06498

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks