General

  • Target

    094d056f6466b1d18cdaddc6239a45a45a2ee50d26481b40576531fe0978fc0e.apk

  • Size

    2.9MB

  • Sample

    210708-lj62n2vfma

  • MD5

    379acade00f050a3642f8762be22928b

  • SHA1

    afb257491887ec8837d8917246eb45caac3bc286

  • SHA256

    094d056f6466b1d18cdaddc6239a45a45a2ee50d26481b40576531fe0978fc0e

  • SHA512

    53a8641d579fa24436a1eab36ac541a41501e4903bb8f98b2a097677a7aee88467441bd76879e1b96c66c9b92c871b154ce8c3c64b56405939b6a9f2df297042

Malware Config

Targets

    • Target

      094d056f6466b1d18cdaddc6239a45a45a2ee50d26481b40576531fe0978fc0e.apk

    • Size

      2.9MB

    • MD5

      379acade00f050a3642f8762be22928b

    • SHA1

      afb257491887ec8837d8917246eb45caac3bc286

    • SHA256

      094d056f6466b1d18cdaddc6239a45a45a2ee50d26481b40576531fe0978fc0e

    • SHA512

      53a8641d579fa24436a1eab36ac541a41501e4903bb8f98b2a097677a7aee88467441bd76879e1b96c66c9b92c871b154ce8c3c64b56405939b6a9f2df297042

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks