Analysis

  • max time kernel
    678254s
  • max time network
    177s
  • platform
    android_x64
  • resource
    android-x64-20220310-en
  • submitted
    03-06-2022 06:35

General

  • Target

    D7FC4377B7A765D6BC3901D0DE01008095965D02062FDA3707957163AFE8884D.apk

  • Size

    208KB

  • MD5

    ec70b3f8db8a66d353cc69704b4d7141

  • SHA1

    13ecd1916ebea34a158b0b369385627b434559f9

  • SHA256

    d7fc4377b7a765d6bc3901d0de01008095965d02062fda3707957163afe8884d

  • SHA512

    9e1f8a8c4751f5647b8f8d54c48bdc77ccfc71cf7720c0a426f3654f110db29a6f929a1edf68608b10892660e09fb3852da8361a4dde327c480ebc0c20d010df

Malware Config

Signatures

  • Anubis banker

    Android banker that uses overlays.

  • Reads information about phone network operator.
  • Listens for changes in the sensor environment (might be used to detect emulation). 1 IoCs

Processes

  • wocwvy.czyxoxmbauu.slsa
    1⤵
    • Listens for changes in the sensor environment (might be used to detect emulation).
    PID:6256

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads