General
-
Target
f2b73d7d7fdd4cb8c229288bb190c28adf86f1b993b79faf3720b34eced66746.apk
-
Size
3.0MB
-
Sample
210715-9j6rhsxsg2
-
MD5
7d0438782b0b68503609170de0c814bc
-
SHA1
8aaad5332b1799a4c7b18203e62e490b7022e966
-
SHA256
f2b73d7d7fdd4cb8c229288bb190c28adf86f1b993b79faf3720b34eced66746
-
SHA512
a57ac677a03ef23c396f9cf6e62d49b3559a495129619a5922559233eeaadfc8cd7bdbb74b5e7006c7bac10480540a9f0e938f252e286cef24a28c91ea3a065e
Static task
static1
Behavioral task
behavioral1
Sample
f2b73d7d7fdd4cb8c229288bb190c28adf86f1b993b79faf3720b34eced66746.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
f2b73d7d7fdd4cb8c229288bb190c28adf86f1b993b79faf3720b34eced66746.apk
-
Size
3.0MB
-
MD5
7d0438782b0b68503609170de0c814bc
-
SHA1
8aaad5332b1799a4c7b18203e62e490b7022e966
-
SHA256
f2b73d7d7fdd4cb8c229288bb190c28adf86f1b993b79faf3720b34eced66746
-
SHA512
a57ac677a03ef23c396f9cf6e62d49b3559a495129619a5922559233eeaadfc8cd7bdbb74b5e7006c7bac10480540a9f0e938f252e286cef24a28c91ea3a065e
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-