General

  • Target

    Voicemail.apk

  • Size

    3.8MB

  • Sample

    210622-w4s917a5jx

  • MD5

    0a296c35e1d7ac2c69cd62b3de246a19

  • SHA1

    9f941ba530d50b907257f9558697cd6ba1617f80

  • SHA256

    06dbf0e0bfab9f74c0744b8fe29bec1cf48171bce9df7ff56be34a62babf15d2

  • SHA512

    44e35b961022871e634d006e575a04c1a3b0cc7d0f07ba23dbdca64435a5aec635002fc701da5f02e6755eb773c5d01699ab8a304580700c74c3a2051e5fccca

Malware Config

Targets

    • Target

      Voicemail.apk

    • Size

      3.8MB

    • MD5

      0a296c35e1d7ac2c69cd62b3de246a19

    • SHA1

      9f941ba530d50b907257f9558697cd6ba1617f80

    • SHA256

      06dbf0e0bfab9f74c0744b8fe29bec1cf48171bce9df7ff56be34a62babf15d2

    • SHA512

      44e35b961022871e634d006e575a04c1a3b0cc7d0f07ba23dbdca64435a5aec635002fc701da5f02e6755eb773c5d01699ab8a304580700c74c3a2051e5fccca

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks