General
-
Target
77fb8c058463491e674e12edafcaafe078b5efcdf823fa74278d10e1f23815f4.apk
-
Size
3.0MB
-
Sample
210702-hsjgtxy8k6
-
MD5
cd934f40a8ae12b1b39dd82a9b09c733
-
SHA1
d90be94043d6c0dac5d529aa4815f321f67d8e07
-
SHA256
77fb8c058463491e674e12edafcaafe078b5efcdf823fa74278d10e1f23815f4
-
SHA512
3250f9793a18de23bcc120077eb88a62c7e3268a71f530294079430ab732833e864c0e8bcfbba262e0671c3a9c56816d3d6c5e10b816eaf451f2b8892bfaeec6
Static task
static1
Behavioral task
behavioral1
Sample
77fb8c058463491e674e12edafcaafe078b5efcdf823fa74278d10e1f23815f4.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
77fb8c058463491e674e12edafcaafe078b5efcdf823fa74278d10e1f23815f4.apk
-
Size
3.0MB
-
MD5
cd934f40a8ae12b1b39dd82a9b09c733
-
SHA1
d90be94043d6c0dac5d529aa4815f321f67d8e07
-
SHA256
77fb8c058463491e674e12edafcaafe078b5efcdf823fa74278d10e1f23815f4
-
SHA512
3250f9793a18de23bcc120077eb88a62c7e3268a71f530294079430ab732833e864c0e8bcfbba262e0671c3a9c56816d3d6c5e10b816eaf451f2b8892bfaeec6
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-