General

  • Target

    1.apk

  • Size

    3.8MB

  • Sample

    210611-4ytsssfc4s

  • MD5

    af10d88e77b84853582d76352f5155dd

  • SHA1

    484239200a2927b23c1b9706607b34a7fa26ee34

  • SHA256

    c0a562759f136fc761fc23b299aadba8b4a96d4802adff067cd2e6c3461d68c1

  • SHA512

    be1b10d848574c7e1c63585394e2e5f0f2b50e6481b205c68f6b34356e40001fc07767f09161cad6121d4f95adcfe95b5647d1a1e273eb995b9055d7130daf0f

Malware Config

Targets

    • Target

      1.apk

    • Size

      3.8MB

    • MD5

      af10d88e77b84853582d76352f5155dd

    • SHA1

      484239200a2927b23c1b9706607b34a7fa26ee34

    • SHA256

      c0a562759f136fc761fc23b299aadba8b4a96d4802adff067cd2e6c3461d68c1

    • SHA512

      be1b10d848574c7e1c63585394e2e5f0f2b50e6481b205c68f6b34356e40001fc07767f09161cad6121d4f95adcfe95b5647d1a1e273eb995b9055d7130daf0f

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks