General

  • Target

    5f4156e89c3d218457db54072b0d04b62dad226dbaf14b0eb0cb3503b4b427db

  • Size

    575KB

  • Sample

    220625-l47nesfhgj

  • MD5

    be1183dd59fb65628a32a3577b8e79b9

  • SHA1

    20771c607b41f65531c48e1b68ecf9a0fbd67e72

  • SHA256

    5f4156e89c3d218457db54072b0d04b62dad226dbaf14b0eb0cb3503b4b427db

  • SHA512

    7568be1817262db363bf9485182c15b95d754c97eca2c4c77eee73613d90317c61f5f5bdbbb323ef353dba786d4470b6bdc8ef99f5c344743dc417a2c6f335fa

Malware Config

Targets

    • Target

      5f4156e89c3d218457db54072b0d04b62dad226dbaf14b0eb0cb3503b4b427db

    • Size

      575KB

    • MD5

      be1183dd59fb65628a32a3577b8e79b9

    • SHA1

      20771c607b41f65531c48e1b68ecf9a0fbd67e72

    • SHA256

      5f4156e89c3d218457db54072b0d04b62dad226dbaf14b0eb0cb3503b4b427db

    • SHA512

      7568be1817262db363bf9485182c15b95d754c97eca2c4c77eee73613d90317c61f5f5bdbbb323ef353dba786d4470b6bdc8ef99f5c344743dc417a2c6f335fa

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks