General

  • Target

    814001A82CC709413BA6D301AD65BD32052E4AA493313117E50CFCB419E3D086.apk

  • Size

    2.5MB

  • Sample

    220603-jqmpzshbdl

  • MD5

    ebb3f0c1dd02fa60eaae2a881445f903

  • SHA1

    32608b24115e7450dd94305efdfa982e0b6ea4bb

  • SHA256

    814001a82cc709413ba6d301ad65bd32052e4aa493313117e50cfcb419e3d086

  • SHA512

    f01d16e2d8a0611a31692e7a30062981cc8d62229b5d21515bf1fb4a74ec01cfd7c69f5014abbfc3fdbbe29135a3286bfaf62ca74fbc8048184285a1095a2a79

Malware Config

Extracted

Family

anubis

C2

https://martilerrentcarskirolrte.com/

Targets

    • Target

      814001A82CC709413BA6D301AD65BD32052E4AA493313117E50CFCB419E3D086.apk

    • Size

      2.5MB

    • MD5

      ebb3f0c1dd02fa60eaae2a881445f903

    • SHA1

      32608b24115e7450dd94305efdfa982e0b6ea4bb

    • SHA256

      814001a82cc709413ba6d301ad65bd32052e4aa493313117e50cfcb419e3d086

    • SHA512

      f01d16e2d8a0611a31692e7a30062981cc8d62229b5d21515bf1fb4a74ec01cfd7c69f5014abbfc3fdbbe29135a3286bfaf62ca74fbc8048184285a1095a2a79

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks