General
-
Target
fbdd4a5c8c0b8634e4adbe96b553029d500e91b7e1d8bd71a63982b686dc5531.apk
-
Size
3.2MB
-
Sample
210720-l7ymr9rct2
-
MD5
385ee32dc9c5579cc6814c5a93fa0ac0
-
SHA1
334cca70acb62a335a92e343f99021a3a2b4e407
-
SHA256
fbdd4a5c8c0b8634e4adbe96b553029d500e91b7e1d8bd71a63982b686dc5531
-
SHA512
8be0a5811d7d0b78ff3755a52391b19a1c47a2d94b185ab421fb63b8ac99b4a94c0a76d4923b133668628bb4ed2fd616a53ec500bf71ce0783130a34ccf50df2
Static task
static1
Behavioral task
behavioral1
Sample
fbdd4a5c8c0b8634e4adbe96b553029d500e91b7e1d8bd71a63982b686dc5531.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
fbdd4a5c8c0b8634e4adbe96b553029d500e91b7e1d8bd71a63982b686dc5531.apk
-
Size
3.2MB
-
MD5
385ee32dc9c5579cc6814c5a93fa0ac0
-
SHA1
334cca70acb62a335a92e343f99021a3a2b4e407
-
SHA256
fbdd4a5c8c0b8634e4adbe96b553029d500e91b7e1d8bd71a63982b686dc5531
-
SHA512
8be0a5811d7d0b78ff3755a52391b19a1c47a2d94b185ab421fb63b8ac99b4a94c0a76d4923b133668628bb4ed2fd616a53ec500bf71ce0783130a34ccf50df2
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-