General

  • Target

    36e2b02806cad49548927bed346c0e42c297574e832fb87d3180acf5d0df1793

  • Size

    430KB

  • Sample

    220816-n68dvagfgk

  • MD5

    b23c66be16b001f62bbfc03a2ee0b6d1

  • SHA1

    d18dbd992d04ef20f2cbbce33822f5dd1e9fb23a

  • SHA256

    36e2b02806cad49548927bed346c0e42c297574e832fb87d3180acf5d0df1793

  • SHA512

    38dc38ab3a3adb0c44ecde60ae06271b74123f3b6adee282988b958b5e37a42e0c971f1d5ec380484e1b6150b11e5fc5e93b5bac2039d76c89c7d748e96c8ad6

Malware Config

Extracted

Family

anubis

C2

http://217.69.13.77

Targets

    • Target

      36e2b02806cad49548927bed346c0e42c297574e832fb87d3180acf5d0df1793

    • Size

      430KB

    • MD5

      b23c66be16b001f62bbfc03a2ee0b6d1

    • SHA1

      d18dbd992d04ef20f2cbbce33822f5dd1e9fb23a

    • SHA256

      36e2b02806cad49548927bed346c0e42c297574e832fb87d3180acf5d0df1793

    • SHA512

      38dc38ab3a3adb0c44ecde60ae06271b74123f3b6adee282988b958b5e37a42e0c971f1d5ec380484e1b6150b11e5fc5e93b5bac2039d76c89c7d748e96c8ad6

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks