General
-
Target
9b81bc3d542d0b725fd72ee45f339ad74e4c8a0916281ea6b83177d7c74bcf5b.bin
-
Size
1.5MB
-
Sample
240714-1zty4avckk
-
MD5
457c10101cbd978be3c6948cd5e040a4
-
SHA1
a0495306bb6b7ffd076e89adcf1128479cd67a29
-
SHA256
9b81bc3d542d0b725fd72ee45f339ad74e4c8a0916281ea6b83177d7c74bcf5b
-
SHA512
db38da19e8ec5385885e89f2727605b1deb6d4c99871dea644dcec68be9329acfade4295ff74047f1f5c310024b41af21da30a70dac79855d5ec6484de0bf7aa
-
SSDEEP
24576:QTjqzxNGfJzxUVQXHoGy1CQmKhAtK8lK/kF8QYnp703kkCCL4HgLn23:QTjanA1UVCHt0Ckhq2sFxYnSk/CL/n23
Behavioral task
behavioral1
Sample
9b81bc3d542d0b725fd72ee45f339ad74e4c8a0916281ea6b83177d7c74bcf5b.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
9b81bc3d542d0b725fd72ee45f339ad74e4c8a0916281ea6b83177d7c74bcf5b.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
9b81bc3d542d0b725fd72ee45f339ad74e4c8a0916281ea6b83177d7c74bcf5b.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
anubis
http://localhost:8080/
Targets
-
-
Target
9b81bc3d542d0b725fd72ee45f339ad74e4c8a0916281ea6b83177d7c74bcf5b.bin
-
Size
1.5MB
-
MD5
457c10101cbd978be3c6948cd5e040a4
-
SHA1
a0495306bb6b7ffd076e89adcf1128479cd67a29
-
SHA256
9b81bc3d542d0b725fd72ee45f339ad74e4c8a0916281ea6b83177d7c74bcf5b
-
SHA512
db38da19e8ec5385885e89f2727605b1deb6d4c99871dea644dcec68be9329acfade4295ff74047f1f5c310024b41af21da30a70dac79855d5ec6484de0bf7aa
-
SSDEEP
24576:QTjqzxNGfJzxUVQXHoGy1CQmKhAtK8lK/kF8QYnp703kkCCL4HgLn23:QTjanA1UVCHt0Ckhq2sFxYnSk/CL/n23
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3System Network Connections Discovery
1