General

  • Target

    7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7.apk

  • Size

    4.1MB

  • Sample

    210629-qb799q2eps

  • MD5

    3acf9f6b6a813d018d643263766f06b5

  • SHA1

    10bfc1b6b540b56386c335bff1399f20f63eafc9

  • SHA256

    7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7

  • SHA512

    db814c7c68e3b837954e3f662e1874e7909b1eca3e008ed789c91ecfceaea6f2e403d9388602f5459b043879392bdf03774bb70d6e862515f230ea9bbb8a3f96

Malware Config

Targets

    • Target

      7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7.apk

    • Size

      4.1MB

    • MD5

      3acf9f6b6a813d018d643263766f06b5

    • SHA1

      10bfc1b6b540b56386c335bff1399f20f63eafc9

    • SHA256

      7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7

    • SHA512

      db814c7c68e3b837954e3f662e1874e7909b1eca3e008ed789c91ecfceaea6f2e403d9388602f5459b043879392bdf03774bb70d6e862515f230ea9bbb8a3f96

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks