General

  • Target

    77fb8c058463491e674e12edafcaafe078b5efcdf823fa74278d10e1f23815f4.apk

  • Size

    3.0MB

  • Sample

    210702-hsjgtxy8k6

  • MD5

    cd934f40a8ae12b1b39dd82a9b09c733

  • SHA1

    d90be94043d6c0dac5d529aa4815f321f67d8e07

  • SHA256

    77fb8c058463491e674e12edafcaafe078b5efcdf823fa74278d10e1f23815f4

  • SHA512

    3250f9793a18de23bcc120077eb88a62c7e3268a71f530294079430ab732833e864c0e8bcfbba262e0671c3a9c56816d3d6c5e10b816eaf451f2b8892bfaeec6

Malware Config

Targets

    • Target

      77fb8c058463491e674e12edafcaafe078b5efcdf823fa74278d10e1f23815f4.apk

    • Size

      3.0MB

    • MD5

      cd934f40a8ae12b1b39dd82a9b09c733

    • SHA1

      d90be94043d6c0dac5d529aa4815f321f67d8e07

    • SHA256

      77fb8c058463491e674e12edafcaafe078b5efcdf823fa74278d10e1f23815f4

    • SHA512

      3250f9793a18de23bcc120077eb88a62c7e3268a71f530294079430ab732833e864c0e8bcfbba262e0671c3a9c56816d3d6c5e10b816eaf451f2b8892bfaeec6

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks