General

  • Target

    61f9b09905c02759518c50a662d7391297c24fecff9420ffd9a070497e9e1985

  • Size

    204KB

  • Sample

    221130-p4qaxsef71

  • MD5

    2e611c42b6a47f535bf832b054ada8d7

  • SHA1

    a68af79d9ad0ab0127ece438bccc20222e31b617

  • SHA256

    61f9b09905c02759518c50a662d7391297c24fecff9420ffd9a070497e9e1985

  • SHA512

    9ddcb3cb75d1314ce6d46bcfea297c609d4e38c99d50ebe83448cf75ecee5770d1e3ef12c0522a9665caec4fd6aa54f2de4e34a691e303790463f6a9bbf37777

  • SSDEEP

    6144:f003SDX3SDXCSDXgSDXySDXFXBPgGSbzGQ/3BjpIMcOgn:fsDSDzDlDjD1XdreGQ/JpIROgn

Malware Config

Extracted

Family

anubis

C2

http://doc-office.xyz/_4nbp

Targets

    • Target

      61f9b09905c02759518c50a662d7391297c24fecff9420ffd9a070497e9e1985

    • Size

      204KB

    • MD5

      2e611c42b6a47f535bf832b054ada8d7

    • SHA1

      a68af79d9ad0ab0127ece438bccc20222e31b617

    • SHA256

      61f9b09905c02759518c50a662d7391297c24fecff9420ffd9a070497e9e1985

    • SHA512

      9ddcb3cb75d1314ce6d46bcfea297c609d4e38c99d50ebe83448cf75ecee5770d1e3ef12c0522a9665caec4fd6aa54f2de4e34a691e303790463f6a9bbf37777

    • SSDEEP

      6144:f003SDX3SDXCSDXgSDXySDXFXBPgGSbzGQ/3BjpIMcOgn:fsDSDzDlDjD1XdreGQ/JpIROgn

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Requests enabling of the accessibility settings.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks