General

  • Target

    73c1c6235ea620a56d2bbd0d66944a5517e9f0ac1b60fcbbf4129c8816c45efc.apk

  • Size

    3.0MB

  • Sample

    210715-n79bn2j2ha

  • MD5

    5f7b0641a5ff1d130a49fe40ee01c632

  • SHA1

    d21eb8f3d75506f68c639c0247091fa6755e51ea

  • SHA256

    73c1c6235ea620a56d2bbd0d66944a5517e9f0ac1b60fcbbf4129c8816c45efc

  • SHA512

    3c1c23e97561ccfc139260b405e15848fa694fc2456168c34eead3a7e674878459f391085479ddb830d4c1c56fcb8c67fa078f0dc1560c3a4f0b1980b116d490

Malware Config

Targets

    • Target

      73c1c6235ea620a56d2bbd0d66944a5517e9f0ac1b60fcbbf4129c8816c45efc.apk

    • Size

      3.0MB

    • MD5

      5f7b0641a5ff1d130a49fe40ee01c632

    • SHA1

      d21eb8f3d75506f68c639c0247091fa6755e51ea

    • SHA256

      73c1c6235ea620a56d2bbd0d66944a5517e9f0ac1b60fcbbf4129c8816c45efc

    • SHA512

      3c1c23e97561ccfc139260b405e15848fa694fc2456168c34eead3a7e674878459f391085479ddb830d4c1c56fcb8c67fa078f0dc1560c3a4f0b1980b116d490

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks