General

  • Target

    dafb93de9a09a2723cc17698a6eceb7d7c2e96e347bdf46290e1276c58da9116.apk

  • Size

    3.2MB

  • Sample

    210708-hlx3ax6dmx

  • MD5

    560e62a1da35b2e2dc131951bcbe7c1b

  • SHA1

    bac4afc22c450224270ea112c4a7bb35ed229c5c

  • SHA256

    dafb93de9a09a2723cc17698a6eceb7d7c2e96e347bdf46290e1276c58da9116

  • SHA512

    a86ee05297be137d9cb685e1636f9bc97204833e8c7ecbbad8bb8b7b53389c53a46ca718cd2de6fe03d6ea7c91b53b3098340d070cc897cdfda92d61b04756cc

Malware Config

Targets

    • Target

      dafb93de9a09a2723cc17698a6eceb7d7c2e96e347bdf46290e1276c58da9116.apk

    • Size

      3.2MB

    • MD5

      560e62a1da35b2e2dc131951bcbe7c1b

    • SHA1

      bac4afc22c450224270ea112c4a7bb35ed229c5c

    • SHA256

      dafb93de9a09a2723cc17698a6eceb7d7c2e96e347bdf46290e1276c58da9116

    • SHA512

      a86ee05297be137d9cb685e1636f9bc97204833e8c7ecbbad8bb8b7b53389c53a46ca718cd2de6fe03d6ea7c91b53b3098340d070cc897cdfda92d61b04756cc

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks