General

  • Target

    87907DBA0127EB3DA29BFB5DA08C83AB94FBD17EA6CE23905C7EEBCC88CF264B.apk

  • Size

    2.6MB

  • Sample

    220603-jsglradbh7

  • MD5

    6154d91d857fe49c425a79d0e498dff9

  • SHA1

    88c476275f2098548163fdfd15ca39501c360fdb

  • SHA256

    87907dba0127eb3da29bfb5da08c83ab94fbd17ea6ce23905c7eebcc88cf264b

  • SHA512

    5740d492b3bacc118a81ab0acfc9a9aaf910394b30c5fe011388c1dce2f5efc47a962d382692f92d528b13d1f76bfcb04b79fc7333e293679939a4e1b1d83952

Malware Config

Extracted

Family

anubis

C2

http://outletups.xyz/

Targets

    • Target

      87907DBA0127EB3DA29BFB5DA08C83AB94FBD17EA6CE23905C7EEBCC88CF264B.apk

    • Size

      2.6MB

    • MD5

      6154d91d857fe49c425a79d0e498dff9

    • SHA1

      88c476275f2098548163fdfd15ca39501c360fdb

    • SHA256

      87907dba0127eb3da29bfb5da08c83ab94fbd17ea6ce23905c7eebcc88cf264b

    • SHA512

      5740d492b3bacc118a81ab0acfc9a9aaf910394b30c5fe011388c1dce2f5efc47a962d382692f92d528b13d1f76bfcb04b79fc7333e293679939a4e1b1d83952

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks