General
-
Target
3fcec46b64c3c6a9c12fd6c48200aa96bda8402181a53bf00b658b9f9834c038.apk
-
Size
3.0MB
-
Sample
210719-5s11d8k2tx
-
MD5
74f0304caf40fb5c593c2a5440f8e13c
-
SHA1
795400d105379d877c80acff778bee93eaedc56d
-
SHA256
3fcec46b64c3c6a9c12fd6c48200aa96bda8402181a53bf00b658b9f9834c038
-
SHA512
3b59a80d694221ae68befbd8998b5505307d41c0c30e40ef439ea38db1b3a6e2937536c7ab01ad2c7c0ddf26e729a86b2623c6dd770dd8fd111de206a15501cd
Static task
static1
Behavioral task
behavioral1
Sample
3fcec46b64c3c6a9c12fd6c48200aa96bda8402181a53bf00b658b9f9834c038.apk
Resource
android-x64-arm64
Malware Config
Targets
-
-
Target
3fcec46b64c3c6a9c12fd6c48200aa96bda8402181a53bf00b658b9f9834c038.apk
-
Size
3.0MB
-
MD5
74f0304caf40fb5c593c2a5440f8e13c
-
SHA1
795400d105379d877c80acff778bee93eaedc56d
-
SHA256
3fcec46b64c3c6a9c12fd6c48200aa96bda8402181a53bf00b658b9f9834c038
-
SHA512
3b59a80d694221ae68befbd8998b5505307d41c0c30e40ef439ea38db1b3a6e2937536c7ab01ad2c7c0ddf26e729a86b2623c6dd770dd8fd111de206a15501cd
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-