General

  • Target

    f2b73d7d7fdd4cb8c229288bb190c28adf86f1b993b79faf3720b34eced66746.apk

  • Size

    3.0MB

  • Sample

    210715-9j6rhsxsg2

  • MD5

    7d0438782b0b68503609170de0c814bc

  • SHA1

    8aaad5332b1799a4c7b18203e62e490b7022e966

  • SHA256

    f2b73d7d7fdd4cb8c229288bb190c28adf86f1b993b79faf3720b34eced66746

  • SHA512

    a57ac677a03ef23c396f9cf6e62d49b3559a495129619a5922559233eeaadfc8cd7bdbb74b5e7006c7bac10480540a9f0e938f252e286cef24a28c91ea3a065e

Malware Config

Targets

    • Target

      f2b73d7d7fdd4cb8c229288bb190c28adf86f1b993b79faf3720b34eced66746.apk

    • Size

      3.0MB

    • MD5

      7d0438782b0b68503609170de0c814bc

    • SHA1

      8aaad5332b1799a4c7b18203e62e490b7022e966

    • SHA256

      f2b73d7d7fdd4cb8c229288bb190c28adf86f1b993b79faf3720b34eced66746

    • SHA512

      a57ac677a03ef23c396f9cf6e62d49b3559a495129619a5922559233eeaadfc8cd7bdbb74b5e7006c7bac10480540a9f0e938f252e286cef24a28c91ea3a065e

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks