General

  • Target

    3fcec46b64c3c6a9c12fd6c48200aa96bda8402181a53bf00b658b9f9834c038.apk

  • Size

    3.0MB

  • Sample

    210719-5s11d8k2tx

  • MD5

    74f0304caf40fb5c593c2a5440f8e13c

  • SHA1

    795400d105379d877c80acff778bee93eaedc56d

  • SHA256

    3fcec46b64c3c6a9c12fd6c48200aa96bda8402181a53bf00b658b9f9834c038

  • SHA512

    3b59a80d694221ae68befbd8998b5505307d41c0c30e40ef439ea38db1b3a6e2937536c7ab01ad2c7c0ddf26e729a86b2623c6dd770dd8fd111de206a15501cd

Malware Config

Targets

    • Target

      3fcec46b64c3c6a9c12fd6c48200aa96bda8402181a53bf00b658b9f9834c038.apk

    • Size

      3.0MB

    • MD5

      74f0304caf40fb5c593c2a5440f8e13c

    • SHA1

      795400d105379d877c80acff778bee93eaedc56d

    • SHA256

      3fcec46b64c3c6a9c12fd6c48200aa96bda8402181a53bf00b658b9f9834c038

    • SHA512

      3b59a80d694221ae68befbd8998b5505307d41c0c30e40ef439ea38db1b3a6e2937536c7ab01ad2c7c0ddf26e729a86b2623c6dd770dd8fd111de206a15501cd

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks