General

  • Target

    BD352E14A8E2C65637BC0A8DE6749F1AC8E1B43AF64FFB78CEA50325018C4477.apk

  • Size

    1.9MB

  • Sample

    220603-ktlgrshggq

  • MD5

    f819be0886ed50a6ccd6791043edbd7c

  • SHA1

    c982ae497b689a0418abd6f4d27a4bbecd237eb3

  • SHA256

    bd352e14a8e2c65637bc0a8de6749f1ac8e1b43af64ffb78cea50325018c4477

  • SHA512

    6a168a147fa98d021a38065bdd8425e16d78fcde4579c30efe91fd2c8c0c87965c2549f1493b5d2fd0b7bed982b1b8ba7e6c9cc6bb8bf699e577084c2badf5b8

Malware Config

Extracted

Family

anubis

C2

http://ourplanet.xyz/

Targets

    • Target

      BD352E14A8E2C65637BC0A8DE6749F1AC8E1B43AF64FFB78CEA50325018C4477.apk

    • Size

      1.9MB

    • MD5

      f819be0886ed50a6ccd6791043edbd7c

    • SHA1

      c982ae497b689a0418abd6f4d27a4bbecd237eb3

    • SHA256

      bd352e14a8e2c65637bc0a8de6749f1ac8e1b43af64ffb78cea50325018c4477

    • SHA512

      6a168a147fa98d021a38065bdd8425e16d78fcde4579c30efe91fd2c8c0c87965c2549f1493b5d2fd0b7bed982b1b8ba7e6c9cc6bb8bf699e577084c2badf5b8

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks