General

  • Target

    0496F43DCC6C2E25BBF6D05A13E72DADC2AE6397FC617C935FD865F243FFD084.apk

  • Size

    2.6MB

  • Sample

    250120-r6p42svkdp

  • MD5

    a1ba897aa937f4fde94652df43432935

  • SHA1

    272b2d9ca67d158d6f2a4635e52593e1d26838a7

  • SHA256

    0496f43dcc6c2e25bbf6d05a13e72dadc2ae6397fc617c935fd865f243ffd084

  • SHA512

    f4befd822b80ca631a648070683923013328755c912ff5623c0dc6b562dc12f1cd55d7a5de95d8c88f884c9f6bf435b0364c7b19d4b6f5737c46bd35e1b06498

  • SSDEEP

    49152:Almh0V89cuRnmdxx8aSkWKT9gMiQ4vhxCIcco0YavpvrATSOxphB:nh0IcuiYkpTmMiQ4px9O0YavpjAGOhB

Malware Config

Extracted

Family

anubis

C2

http://92.42.45.152/

Targets

    • Target

      0496F43DCC6C2E25BBF6D05A13E72DADC2AE6397FC617C935FD865F243FFD084.apk

    • Size

      2.6MB

    • MD5

      a1ba897aa937f4fde94652df43432935

    • SHA1

      272b2d9ca67d158d6f2a4635e52593e1d26838a7

    • SHA256

      0496f43dcc6c2e25bbf6d05a13e72dadc2ae6397fc617c935fd865f243ffd084

    • SHA512

      f4befd822b80ca631a648070683923013328755c912ff5623c0dc6b562dc12f1cd55d7a5de95d8c88f884c9f6bf435b0364c7b19d4b6f5737c46bd35e1b06498

    • SSDEEP

      49152:Almh0V89cuRnmdxx8aSkWKT9gMiQ4vhxCIcco0YavpvrATSOxphB:nh0IcuiYkpTmMiQ4px9O0YavpjAGOhB

    • Anubis banker

      Android banker that uses overlays.

    • Anubis family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks