General

  • Target

    87907dba0127eb3da29bfb5da08c83ab94fbd17ea6ce23905c7eebcc88cf264b

  • Size

    2.6MB

  • Sample

    231220-f62masdfej

  • MD5

    6154d91d857fe49c425a79d0e498dff9

  • SHA1

    88c476275f2098548163fdfd15ca39501c360fdb

  • SHA256

    87907dba0127eb3da29bfb5da08c83ab94fbd17ea6ce23905c7eebcc88cf264b

  • SHA512

    5740d492b3bacc118a81ab0acfc9a9aaf910394b30c5fe011388c1dce2f5efc47a962d382692f92d528b13d1f76bfcb04b79fc7333e293679939a4e1b1d83952

  • SSDEEP

    49152:Dlmh0Vi+1Nz2qb2GJGcIQpbIKYeVsGkkhmuoOE9rZrgTy2+2O:Qh0dNz2q1IQpbIKnpjXoOEhZrx/

Malware Config

Extracted

Family

anubis

C2

http://outletups.xyz/

Targets

    • Target

      87907dba0127eb3da29bfb5da08c83ab94fbd17ea6ce23905c7eebcc88cf264b

    • Size

      2.6MB

    • MD5

      6154d91d857fe49c425a79d0e498dff9

    • SHA1

      88c476275f2098548163fdfd15ca39501c360fdb

    • SHA256

      87907dba0127eb3da29bfb5da08c83ab94fbd17ea6ce23905c7eebcc88cf264b

    • SHA512

      5740d492b3bacc118a81ab0acfc9a9aaf910394b30c5fe011388c1dce2f5efc47a962d382692f92d528b13d1f76bfcb04b79fc7333e293679939a4e1b1d83952

    • SSDEEP

      49152:Dlmh0Vi+1Nz2qb2GJGcIQpbIKYeVsGkkhmuoOE9rZrgTy2+2O:Qh0dNz2q1IQpbIKnpjXoOEhZrx/

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks