General

  • Target

    eb22cda0c0e7b299d6cffe02ef3b04d7b2de7b16f27ad7b6058753c5f2723f12.bin

  • Size

    457KB

  • Sample

    240124-1x4eraabgk

  • MD5

    be4418728de05dd953326c1380a3219c

  • SHA1

    447586421fcb94398da3d97cd9edc17a21b75bb3

  • SHA256

    eb22cda0c0e7b299d6cffe02ef3b04d7b2de7b16f27ad7b6058753c5f2723f12

  • SHA512

    1f7b0442b828c7f0cd9a169ba7b053c4d1bffca148fe1bb9cf1f71389027261e5524eff0dd586c91755a466be62caef9d5de676a82165f8f736fbd43c3d54ddc

  • SSDEEP

    12288:8kZHjTlNHRZK/NAisRNwMoiwPXAbMpLxNwMoiwPXAbMpLH:8KnHR+sjmiwPQwZmiwPQwZ

Malware Config

Extracted

Family

anubis

C2

https://fhghfghfghfghfghf

Targets

    • Target

      eb22cda0c0e7b299d6cffe02ef3b04d7b2de7b16f27ad7b6058753c5f2723f12.bin

    • Size

      457KB

    • MD5

      be4418728de05dd953326c1380a3219c

    • SHA1

      447586421fcb94398da3d97cd9edc17a21b75bb3

    • SHA256

      eb22cda0c0e7b299d6cffe02ef3b04d7b2de7b16f27ad7b6058753c5f2723f12

    • SHA512

      1f7b0442b828c7f0cd9a169ba7b053c4d1bffca148fe1bb9cf1f71389027261e5524eff0dd586c91755a466be62caef9d5de676a82165f8f736fbd43c3d54ddc

    • SSDEEP

      12288:8kZHjTlNHRZK/NAisRNwMoiwPXAbMpLxNwMoiwPXAbMpLH:8KnHR+sjmiwPQwZmiwPQwZ

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Acquires the wake lock

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks