General
-
Target
_9.3(2).apk
-
Size
6.0MB
-
Sample
241205-nl9feasmhv
-
MD5
bb37b95ade556aa58b7532bffc6d38d7
-
SHA1
d2e056ee8bbeed237ca0c27ecae5f9406af07227
-
SHA256
1541706ec9534d9c636d65f84bf0cb7394b1123ee789e12353ad13194c1cd204
-
SHA512
3bc2112f876770a603a9986665b1caf5e27b029539643379389115f262980539ff22c7fde4199344a5578fc57cf5cbf9e44a2caa367d469d4b4f19a738fb7b47
-
SSDEEP
98304:7kJ9TebkrRwjolZ0M0b9FjYy5OVSeZ+/1KryBdgy+iOFCLqjD+f:GRx0M29VYysVSeE/UUqziBwqf
Static task
static1
Behavioral task
behavioral1
Sample
_9.3(2).apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
anubis
https://google.com
Targets
-
-
Target
_9.3(2).apk
-
Size
6.0MB
-
MD5
bb37b95ade556aa58b7532bffc6d38d7
-
SHA1
d2e056ee8bbeed237ca0c27ecae5f9406af07227
-
SHA256
1541706ec9534d9c636d65f84bf0cb7394b1123ee789e12353ad13194c1cd204
-
SHA512
3bc2112f876770a603a9986665b1caf5e27b029539643379389115f262980539ff22c7fde4199344a5578fc57cf5cbf9e44a2caa367d469d4b4f19a738fb7b47
-
SSDEEP
98304:7kJ9TebkrRwjolZ0M0b9FjYy5OVSeZ+/1KryBdgy+iOFCLqjD+f:GRx0M29VYysVSeE/UUqziBwqf
-
Anubis family
-
Otpstealer
Otpstealer is an Android SMS Stealer that targets OTP first seen in February 2022.
-
Otpstealer family
-
Otpstealer payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Reads the contacts stored on the device.
-
Reads the content of the calendar entry data.
-
Reads the content of the call log.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Foreground Persistence
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Input Injection
1Discovery
Location Tracking
1Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
1System Network Connections Discovery
2