General

  • Target

    D7FC4377B7A765D6BC3901D0DE01008095965D02062FDA3707957163AFE8884D.apk

  • Size

    208KB

  • Sample

    220603-hcmbmafhbn

  • MD5

    ec70b3f8db8a66d353cc69704b4d7141

  • SHA1

    13ecd1916ebea34a158b0b369385627b434559f9

  • SHA256

    d7fc4377b7a765d6bc3901d0de01008095965d02062fda3707957163afe8884d

  • SHA512

    9e1f8a8c4751f5647b8f8d54c48bdc77ccfc71cf7720c0a426f3654f110db29a6f929a1edf68608b10892660e09fb3852da8361a4dde327c480ebc0c20d010df

Malware Config

Extracted

Family

anubis

C2

http://185.212.129.201

Targets

    • Target

      D7FC4377B7A765D6BC3901D0DE01008095965D02062FDA3707957163AFE8884D.apk

    • Size

      208KB

    • MD5

      ec70b3f8db8a66d353cc69704b4d7141

    • SHA1

      13ecd1916ebea34a158b0b369385627b434559f9

    • SHA256

      d7fc4377b7a765d6bc3901d0de01008095965d02062fda3707957163afe8884d

    • SHA512

      9e1f8a8c4751f5647b8f8d54c48bdc77ccfc71cf7720c0a426f3654f110db29a6f929a1edf68608b10892660e09fb3852da8361a4dde327c480ebc0c20d010df

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks