General
-
Target
5c4dc3463ce23ec3628f80cd65c90fae221bdab8e92631ef1e536704c2a47a60.apk
-
Size
3.0MB
-
Sample
210720-pmmdbmzp82
-
MD5
6a679f7d5a4681fb7e95e730aa7363a0
-
SHA1
3260270aea544eb415ca07861a75b17d1e2a1c61
-
SHA256
5c4dc3463ce23ec3628f80cd65c90fae221bdab8e92631ef1e536704c2a47a60
-
SHA512
724185620d7964d0ed5e08d8f4a0a95ddbcc55333b6ffabc98fa3ae759ed839d546044ef80acc5096d3e0b1213b73ca4d6ebba37d803be1bbd3a496c74c4cfbd
Static task
static1
Behavioral task
behavioral1
Sample
5c4dc3463ce23ec3628f80cd65c90fae221bdab8e92631ef1e536704c2a47a60.apk
Resource
android-x64-arm64
Malware Config
Targets
-
-
Target
5c4dc3463ce23ec3628f80cd65c90fae221bdab8e92631ef1e536704c2a47a60.apk
-
Size
3.0MB
-
MD5
6a679f7d5a4681fb7e95e730aa7363a0
-
SHA1
3260270aea544eb415ca07861a75b17d1e2a1c61
-
SHA256
5c4dc3463ce23ec3628f80cd65c90fae221bdab8e92631ef1e536704c2a47a60
-
SHA512
724185620d7964d0ed5e08d8f4a0a95ddbcc55333b6ffabc98fa3ae759ed839d546044ef80acc5096d3e0b1213b73ca4d6ebba37d803be1bbd3a496c74c4cfbd
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Uses Crypto APIs (Might try to encrypt user data).
-