General

  • Target

    e68fb8ee8306faaf6fd952333d4c1a4d

  • Size

    4.0MB

  • Sample

    210513-q1xa72xpns

  • MD5

    e68fb8ee8306faaf6fd952333d4c1a4d

  • SHA1

    dae7975fe9dd29908d1ac4db5824d7036f46b533

  • SHA256

    fcf06f3ba301946d82b2bbb7da59af21216535f7dddf2109aab1ed3d3fd3b049

  • SHA512

    10dd19dc91fab497e17618b11f07bca08770b56470db63886bf5bdd2ce787e4604cc5d52c4595994ca7783c682f05c27a57a37d3d0cebe00c3266b54ca79c0e6

Malware Config

Targets

    • Target

      e68fb8ee8306faaf6fd952333d4c1a4d

    • Size

      4.0MB

    • MD5

      e68fb8ee8306faaf6fd952333d4c1a4d

    • SHA1

      dae7975fe9dd29908d1ac4db5824d7036f46b533

    • SHA256

      fcf06f3ba301946d82b2bbb7da59af21216535f7dddf2109aab1ed3d3fd3b049

    • SHA512

      10dd19dc91fab497e17618b11f07bca08770b56470db63886bf5bdd2ce787e4604cc5d52c4595994ca7783c682f05c27a57a37d3d0cebe00c3266b54ca79c0e6

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks