Resubmissions
17-02-2025 13:54
250217-q71fqszket 1017-02-2025 13:54
250217-q7q73azjgq 617-02-2025 12:50
250217-p3cnfaypen 10Analysis
-
max time kernel
29s -
max time network
37s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
17-02-2025 13:54
Static task
static1
Behavioral task
behavioral1
Sample
B6534569C66B247263E086F3D0141B3F1E2B86C69423379FE8EB0480CE2123F2.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
B6534569C66B247263E086F3D0141B3F1E2B86C69423379FE8EB0480CE2123F2.apk
-
Size
550KB
-
MD5
a6442b382d8ddba47390bbd18fd3d1bd
-
SHA1
8564d9093e51b7039aaa183901411163e913da2f
-
SHA256
b6534569c66b247263e086f3d0141b3f1e2b86c69423379fe8eb0480ce2123f2
-
SHA512
1ed5948b73533904f26f76ac04dffa17c930a89b4a062b79a102251d89cfef33233a413f710c4637016124c6dde787df0438e98a0e5ce3f7eb9a9aa115317ab0
-
SSDEEP
12288:l/u2OaK0C2n3TdlMkF2EOW8vEdoiWepD/DREjDXB:xN40znDdPRfbW5ozDgx
Malware Config
Extracted
anubis
http://www.flashl1ght.top
Signatures
-
Anubis banker
Android banker that uses overlays.
-
Anubis family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.xajzdrzcpbf.pmgxnve/app_files/gizcmxfchigm.jar 4354 com.xajzdrzcpbf.pmgxnve -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.xajzdrzcpbf.pmgxnve Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.xajzdrzcpbf.pmgxnve -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.xajzdrzcpbf.pmgxnve -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.xajzdrzcpbf.pmgxnve -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.xajzdrzcpbf.pmgxnve -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.xajzdrzcpbf.pmgxnve
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD5528965397abdf6538fb83e97fa753e6f
SHA1daabe5c88efbf74d227007fba4c625768472f980
SHA256eb7445fb6d5cf52f08fd40d6139cae7e41b1a1505860506032dbd472b8c558bd
SHA5123f82803cca40f151040222e264334bee7a1e97dc2ba4d47c23b05a3f86585cfbf9427dd84c76322da2ff5d78cc3da423f765a984e53d4bc5da1b67d261bc34b0
-
Filesize
345KB
MD56df28f5149abf83c9163a12f3a7d017a
SHA116dfb6fd52c372b96b526b8c88856d141638cfc0
SHA25629789de9b333f095ad630c854fb55c256207350cdee8fe24fdb143f0c4e96f6a
SHA51223d6f4eeaccdeade1aae7d0f89e0912ed70d1284840efd0b28d2db1055e281f41ab9d7513f26baffd7ec76978b17eca2365db593e9b1121f22e798a02a675384