General

  • Target

    c3c3394e459bb244e9e5a6923739086b0cd37b51c732bce7fed63db9a9ee2d2b.apk

  • Size

    3.9MB

  • Sample

    210706-dry9f8byb6

  • MD5

    2e34b6fdf50aad8adad407bb49d79a2d

  • SHA1

    ca73e698212f5e829305d3d1e882592e21aaa6a8

  • SHA256

    c3c3394e459bb244e9e5a6923739086b0cd37b51c732bce7fed63db9a9ee2d2b

  • SHA512

    275d66589750742c0d2cff4e536dc422d4733f329e108d90f87fc596c9dde9d79ad4ab741e2893a00e14b00b5faa8151284304b91f3ea189040c16329eb96a9f

Malware Config

Targets

    • Target

      c3c3394e459bb244e9e5a6923739086b0cd37b51c732bce7fed63db9a9ee2d2b.apk

    • Size

      3.9MB

    • MD5

      2e34b6fdf50aad8adad407bb49d79a2d

    • SHA1

      ca73e698212f5e829305d3d1e882592e21aaa6a8

    • SHA256

      c3c3394e459bb244e9e5a6923739086b0cd37b51c732bce7fed63db9a9ee2d2b

    • SHA512

      275d66589750742c0d2cff4e536dc422d4733f329e108d90f87fc596c9dde9d79ad4ab741e2893a00e14b00b5faa8151284304b91f3ea189040c16329eb96a9f

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks