Skip to content

S0422 Anubis

Anubis is Android malware that was originally used for cyber espionage, and has been retooled as a banking trojan.1

Item Value
ID S0422
Associated Names
Type MALWARE
Version 1.3
Created 08 April 2020
Last Modified 20 September 2021
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
mobile T1532 Archive Collected Data Anubis exfiltrates data encrypted (with RC4) by its ransomware module.1
mobile T1429 Audio Capture Anubis can record phone calls and audio.1
mobile T1616 Call Control Anubis can make phone calls.1
mobile T1471 Data Encrypted for Impact Anubis can use its ransomware module to encrypt device data and hold it for ransom.1
mobile T1533 Data from Local System Anubis can exfiltrate files encrypted with the ransomware module from the device and can modify external storage.12
mobile T1407 Download New Code at Runtime Anubis can download attacker-specified APK files.2
mobile T1629 Impair Defenses -
mobile T1629.003 Disable or Modify Tools Anubis can modify administrator settings and disable Play Protect.1
mobile T1417 Input Capture -
mobile T1417.001 Keylogging Anubis has a keylogger that works in every application installed on the device.1
mobile T1417.002 GUI Input Capture Anubis can create overlays to capture user credentials for targeted applications.1
mobile T1430 Location Tracking Anubis can retrieve the device’s GPS location.1
mobile T1424 Process Discovery Anubis can collect a list of running processes.3
mobile T1636 Protected User Data -
mobile T1636.003 Contact List Anubis can steal the device’s contact list.1
mobile T1513 Screen Capture Anubis can take screenshots.1
mobile T1582 SMS Control Anubis can send, receive, and delete SMS messages.1
mobile T1418 Software Discovery Anubis can collect a list of installed applications to compare to a list of targeted applications.1
mobile T1426 System Information Discovery Anubis can collect the device’s ID.1
mobile T1633 Virtualization/Sandbox Evasion -
mobile T1633.001 System Checks Anubis has used motion sensor data to attempt to determine if it is running in an emulator.2
mobile T1481 Web Service -
mobile T1481.001 Dead Drop Resolver Anubis can retrieve the C2 address from Twitter and Telegram.12

References