General

  • Target

    ea0ea8d61d7e8a6aef90f1d21ed65d31c3e49ca235cecee322c9dfe631414c58.bin

  • Size

    360KB

  • Sample

    240718-11k3ksyepq

  • MD5

    dab95b4692de509ae9bea045b6ab81f1

  • SHA1

    86356346dc2ce1f26dbb3b471cedb96b404f6e1e

  • SHA256

    ea0ea8d61d7e8a6aef90f1d21ed65d31c3e49ca235cecee322c9dfe631414c58

  • SHA512

    394d3f7b6f5620acd149fa6d7fef9351d94fa2521f89c35131e279d9e9f1d7d5c1918a81f4f43c66c48be55b740c6bcb40f2861e1b69fdd85585baf6e6e0827f

  • SSDEEP

    6144:tTomipFaxl2ZkyY47C+uA7asOQwT7gTnEJD0VilSIKexXSFuauAvS40X:tUmipFayvu+uA72Q+DliFuauAvSlX

Malware Config

Extracted

Family

anubis

C2

https://qzwrxetcryvtubynumnuybtvrcewsdcfv.com

Targets

    • Target

      ea0ea8d61d7e8a6aef90f1d21ed65d31c3e49ca235cecee322c9dfe631414c58.bin

    • Size

      360KB

    • MD5

      dab95b4692de509ae9bea045b6ab81f1

    • SHA1

      86356346dc2ce1f26dbb3b471cedb96b404f6e1e

    • SHA256

      ea0ea8d61d7e8a6aef90f1d21ed65d31c3e49ca235cecee322c9dfe631414c58

    • SHA512

      394d3f7b6f5620acd149fa6d7fef9351d94fa2521f89c35131e279d9e9f1d7d5c1918a81f4f43c66c48be55b740c6bcb40f2861e1b69fdd85585baf6e6e0827f

    • SSDEEP

      6144:tTomipFaxl2ZkyY47C+uA7asOQwT7gTnEJD0VilSIKexXSFuauAvS40X:tUmipFayvu+uA72Q+DliFuauAvSlX

    • Anubis banker

      Android banker that uses overlays.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks