Analysis

  • max time kernel
    678576s
  • max time network
    78s
  • platform
    android_x86
  • resource
    android-x86-arm-20220310-en
  • submitted
    03-06-2022 06:35

General

  • Target

    D7FC4377B7A765D6BC3901D0DE01008095965D02062FDA3707957163AFE8884D.apk

  • Size

    208KB

  • MD5

    ec70b3f8db8a66d353cc69704b4d7141

  • SHA1

    13ecd1916ebea34a158b0b369385627b434559f9

  • SHA256

    d7fc4377b7a765d6bc3901d0de01008095965d02062fda3707957163afe8884d

  • SHA512

    9e1f8a8c4751f5647b8f8d54c48bdc77ccfc71cf7720c0a426f3654f110db29a6f929a1edf68608b10892660e09fb3852da8361a4dde327c480ebc0c20d010df

Malware Config

Signatures

  • Anubis banker

    Android banker that uses overlays.

  • Makes use of the framework's Accessibility service. 2 IoCs
  • Acquires the wake lock. 1 IoCs
  • Reads information about phone network operator.
  • Listens for changes in the sensor environment (might be used to detect emulation). 1 IoCs

Processes

  • wocwvy.czyxoxmbauu.slsa
    1⤵
    • Makes use of the framework's Accessibility service.
    • Acquires the wake lock.
    • Listens for changes in the sensor environment (might be used to detect emulation).
    PID:5184

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads