General

  • Target

    005e033dc1dfbfb9d2a3989e91705ab9.apk

  • Size

    1.2MB

  • Sample

    220821-h7rvlahbg3

  • MD5

    005e033dc1dfbfb9d2a3989e91705ab9

  • SHA1

    631fac97cabfbad8f73da4aa550e359e012d3125

  • SHA256

    7db9ad455ad55e81b10ec87a25b1f02bdad8fcbd7326f96f7d367c456f8b5921

  • SHA512

    c4ffc229754f073dd115fc2474f9851ce3de546dcf4f801af022445c98d38c23f28ad2d5a50c54605f6c49dd1c9e657c9c46c99957759144db09f1c400af1246

  • SSDEEP

    24576:xCRHeIJpKfvwgTkq2uamtSncLI3n5X1GgFHvKgcLMnPQqjrFnuYr:IHnXgvwgoqYLckrRKsnYqjBu8

Malware Config

Targets

    • Target

      005e033dc1dfbfb9d2a3989e91705ab9.apk

    • Size

      1.2MB

    • MD5

      005e033dc1dfbfb9d2a3989e91705ab9

    • SHA1

      631fac97cabfbad8f73da4aa550e359e012d3125

    • SHA256

      7db9ad455ad55e81b10ec87a25b1f02bdad8fcbd7326f96f7d367c456f8b5921

    • SHA512

      c4ffc229754f073dd115fc2474f9851ce3de546dcf4f801af022445c98d38c23f28ad2d5a50c54605f6c49dd1c9e657c9c46c99957759144db09f1c400af1246

    • SSDEEP

      24576:xCRHeIJpKfvwgTkq2uamtSncLI3n5X1GgFHvKgcLMnPQqjrFnuYr:IHnXgvwgoqYLckrRKsnYqjBu8

    • Anubis banker

      Android banker that uses overlays.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks