General

  • Target

    3057caca88807270b93142eb314755dec69d7cbe09fe7b9d78dce5e5c7ef4913.apk

  • Size

    3.0MB

  • Sample

    210719-6jdne3k9ye

  • MD5

    0334eba56e362dfa8c4aba3ee202624a

  • SHA1

    acf7ded10113927a7077bffe50346d7a2387e971

  • SHA256

    3057caca88807270b93142eb314755dec69d7cbe09fe7b9d78dce5e5c7ef4913

  • SHA512

    596e6c3d2a42bf90f30470cf69cfbe3c71a0420232539d4fab74dc9af5282c439dd8a49ea01ff2fd3286690dc9257c70849231179ce839d81326f966612de78e

Malware Config

Targets

    • Target

      3057caca88807270b93142eb314755dec69d7cbe09fe7b9d78dce5e5c7ef4913.apk

    • Size

      3.0MB

    • MD5

      0334eba56e362dfa8c4aba3ee202624a

    • SHA1

      acf7ded10113927a7077bffe50346d7a2387e971

    • SHA256

      3057caca88807270b93142eb314755dec69d7cbe09fe7b9d78dce5e5c7ef4913

    • SHA512

      596e6c3d2a42bf90f30470cf69cfbe3c71a0420232539d4fab74dc9af5282c439dd8a49ea01ff2fd3286690dc9257c70849231179ce839d81326f966612de78e

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks