General

  • Target

    c3177d9201c4a177ecbaf0224e7628f3

  • Size

    2.9MB

  • Sample

    220603-ksyeyahgfq

  • MD5

    c3177d9201c4a177ecbaf0224e7628f3

  • SHA1

    6a545ba1701d17afeb6ecdeb4a7ad7e76c2fd4c6

  • SHA256

    b77adec6e50e884b03750944f41d539213d7cc1e9cadd86e76fa0cacf83ad9ed

  • SHA512

    c77e3c75276550bdb4ded0a069945426445914fe62ca87243e0a03a3148ffc91ab91dce54603bdaad7e85e462f7e70cf698f017019e640bdf694d6cba5927c8d

Malware Config

Extracted

Family

anubis

C2

https://reazy.dev/

Targets

    • Target

      c3177d9201c4a177ecbaf0224e7628f3

    • Size

      2.9MB

    • MD5

      c3177d9201c4a177ecbaf0224e7628f3

    • SHA1

      6a545ba1701d17afeb6ecdeb4a7ad7e76c2fd4c6

    • SHA256

      b77adec6e50e884b03750944f41d539213d7cc1e9cadd86e76fa0cacf83ad9ed

    • SHA512

      c77e3c75276550bdb4ded0a069945426445914fe62ca87243e0a03a3148ffc91ab91dce54603bdaad7e85e462f7e70cf698f017019e640bdf694d6cba5927c8d

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks