General
-
Target
7f095a2340fcff1d4a07b9f078cc58d96879cd58273bbfe99f633870adeeaeb5.apk
-
Size
3.0MB
-
Sample
210715-zvakyxpn9x
-
MD5
b8711a1d116cd46607b13bdc9e3f9617
-
SHA1
b8ad57cde4d23498b62f4d69a1b53d4b5a45b507
-
SHA256
7f095a2340fcff1d4a07b9f078cc58d96879cd58273bbfe99f633870adeeaeb5
-
SHA512
7e226ef85465de9755e7811a3c12a5d0100fae10ff4dc6edebb47a7feba6103220160296b0010b4cd0b44ad14d087f88a1a0c509c485bddb379b53387877cfa4
Static task
static1
Behavioral task
behavioral1
Sample
7f095a2340fcff1d4a07b9f078cc58d96879cd58273bbfe99f633870adeeaeb5.apk
Resource
android-x64-arm64
Malware Config
Targets
-
-
Target
7f095a2340fcff1d4a07b9f078cc58d96879cd58273bbfe99f633870adeeaeb5.apk
-
Size
3.0MB
-
MD5
b8711a1d116cd46607b13bdc9e3f9617
-
SHA1
b8ad57cde4d23498b62f4d69a1b53d4b5a45b507
-
SHA256
7f095a2340fcff1d4a07b9f078cc58d96879cd58273bbfe99f633870adeeaeb5
-
SHA512
7e226ef85465de9755e7811a3c12a5d0100fae10ff4dc6edebb47a7feba6103220160296b0010b4cd0b44ad14d087f88a1a0c509c485bddb379b53387877cfa4
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Uses Crypto APIs (Might try to encrypt user data).
-