General

  • Target

    5c4dc3463ce23ec3628f80cd65c90fae221bdab8e92631ef1e536704c2a47a60.apk

  • Size

    3.0MB

  • Sample

    210720-pmmdbmzp82

  • MD5

    6a679f7d5a4681fb7e95e730aa7363a0

  • SHA1

    3260270aea544eb415ca07861a75b17d1e2a1c61

  • SHA256

    5c4dc3463ce23ec3628f80cd65c90fae221bdab8e92631ef1e536704c2a47a60

  • SHA512

    724185620d7964d0ed5e08d8f4a0a95ddbcc55333b6ffabc98fa3ae759ed839d546044ef80acc5096d3e0b1213b73ca4d6ebba37d803be1bbd3a496c74c4cfbd

Malware Config

Targets

    • Target

      5c4dc3463ce23ec3628f80cd65c90fae221bdab8e92631ef1e536704c2a47a60.apk

    • Size

      3.0MB

    • MD5

      6a679f7d5a4681fb7e95e730aa7363a0

    • SHA1

      3260270aea544eb415ca07861a75b17d1e2a1c61

    • SHA256

      5c4dc3463ce23ec3628f80cd65c90fae221bdab8e92631ef1e536704c2a47a60

    • SHA512

      724185620d7964d0ed5e08d8f4a0a95ddbcc55333b6ffabc98fa3ae759ed839d546044ef80acc5096d3e0b1213b73ca4d6ebba37d803be1bbd3a496c74c4cfbd

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks