General
-
Target
com.tencent.mm.apk
-
Size
3.7MB
-
Sample
250125-jp628svlfk
-
MD5
e15906ac8b360aa6e7867fcbb2922089
-
SHA1
53555056dd2af1933b911ac8adc81a2f438216c1
-
SHA256
9eaabb6d9f532f9fa304a6826b269296d7ed7ebc404827eb99b3dec1f9bc2b89
-
SHA512
d79083592e07fe78d3bfabe5989aab9e6eba61ee1632b724115e6170daaad84e9d58f42658aa2dabfa00fe6afa2c8c4b9390d924bde9c538dbddbb4a4a8157f2
-
SSDEEP
98304:jPR8//FcLJcwHCxZei/svO7LgJQYlcqPTwWVKQ/9Nx:rRy/K1cwix9svOuGqPTp3x
Static task
static1
Behavioral task
behavioral1
Sample
com.tencent.mm.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
com.tencent.mm.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
com.tencent.mm.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
anubis
http://Google.com
Targets
-
-
Target
com.tencent.mm.apk
-
Size
3.7MB
-
MD5
e15906ac8b360aa6e7867fcbb2922089
-
SHA1
53555056dd2af1933b911ac8adc81a2f438216c1
-
SHA256
9eaabb6d9f532f9fa304a6826b269296d7ed7ebc404827eb99b3dec1f9bc2b89
-
SHA512
d79083592e07fe78d3bfabe5989aab9e6eba61ee1632b724115e6170daaad84e9d58f42658aa2dabfa00fe6afa2c8c4b9390d924bde9c538dbddbb4a4a8157f2
-
SSDEEP
98304:jPR8//FcLJcwHCxZei/svO7LgJQYlcqPTwWVKQ/9Nx:rRy/K1cwix9svOuGqPTp3x
-
Anubis family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1