General
-
Target
LIVE XNXX.apk
-
Size
6.0MB
-
Sample
241203-m8s69sxrfn
-
MD5
df359f6914ef1280e5a5f8a9a84cb0ae
-
SHA1
111c767ab64194e26635959d7eb827ed71ac708c
-
SHA256
90cd410eaee0844f12da50dc58d48b9a28d8337b12930439d21cb946111bddbe
-
SHA512
84328b43dc7e1b622e7f1ccb62c710b66ff6d877ce95339f2ddcee8cf6758235c3ad8509aee103173f45bc003cbbc8a9c518c9f3951e170d05c83cb839453db9
-
SSDEEP
98304:NkJ9sl6k9guG4FH0ohxD7aUNKeA8Zmh7P0nN51zRbnNvPOFMBEmsenPKVZ0jv9ev:RK4JhhlUeA3hTKtndm8geiV+L9wXQY
Static task
static1
Behavioral task
behavioral1
Sample
LIVE XNXX.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
anubis
https://google.com
Targets
-
-
Target
LIVE XNXX.apk
-
Size
6.0MB
-
MD5
df359f6914ef1280e5a5f8a9a84cb0ae
-
SHA1
111c767ab64194e26635959d7eb827ed71ac708c
-
SHA256
90cd410eaee0844f12da50dc58d48b9a28d8337b12930439d21cb946111bddbe
-
SHA512
84328b43dc7e1b622e7f1ccb62c710b66ff6d877ce95339f2ddcee8cf6758235c3ad8509aee103173f45bc003cbbc8a9c518c9f3951e170d05c83cb839453db9
-
SSDEEP
98304:NkJ9sl6k9guG4FH0ohxD7aUNKeA8Zmh7P0nN51zRbnNvPOFMBEmsenPKVZ0jv9ev:RK4JhhlUeA3hTKtndm8geiV+L9wXQY
-
Anubis family
-
Otpstealer
Otpstealer is an Android SMS Stealer that targets OTP first seen in February 2022.
-
Otpstealer family
-
Otpstealer payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the contacts stored on the device.
-
Reads the content of the calendar entry data.
-
Reads the content of the call log.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Input Injection
1Discovery
Location Tracking
1Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3System Network Connections Discovery
1