General

  • Target

    7f095a2340fcff1d4a07b9f078cc58d96879cd58273bbfe99f633870adeeaeb5.apk

  • Size

    3.0MB

  • Sample

    210715-zvakyxpn9x

  • MD5

    b8711a1d116cd46607b13bdc9e3f9617

  • SHA1

    b8ad57cde4d23498b62f4d69a1b53d4b5a45b507

  • SHA256

    7f095a2340fcff1d4a07b9f078cc58d96879cd58273bbfe99f633870adeeaeb5

  • SHA512

    7e226ef85465de9755e7811a3c12a5d0100fae10ff4dc6edebb47a7feba6103220160296b0010b4cd0b44ad14d087f88a1a0c509c485bddb379b53387877cfa4

Malware Config

Targets

    • Target

      7f095a2340fcff1d4a07b9f078cc58d96879cd58273bbfe99f633870adeeaeb5.apk

    • Size

      3.0MB

    • MD5

      b8711a1d116cd46607b13bdc9e3f9617

    • SHA1

      b8ad57cde4d23498b62f4d69a1b53d4b5a45b507

    • SHA256

      7f095a2340fcff1d4a07b9f078cc58d96879cd58273bbfe99f633870adeeaeb5

    • SHA512

      7e226ef85465de9755e7811a3c12a5d0100fae10ff4dc6edebb47a7feba6103220160296b0010b4cd0b44ad14d087f88a1a0c509c485bddb379b53387877cfa4

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks