General

  • Target

    ff13e3fc4f3d2d9f23e5eb36af4d5728e1c10cbfef4b390aa9d01342904fe018.apk

  • Size

    3.0MB

  • Sample

    210720-rnncvpw35x

  • MD5

    872edf75f8f915c5308dd155aa81a063

  • SHA1

    facef6d39be6ab133e1bf99fa5f78d5131cf74d3

  • SHA256

    ff13e3fc4f3d2d9f23e5eb36af4d5728e1c10cbfef4b390aa9d01342904fe018

  • SHA512

    eac92165f1d1f1334aea43e1a5439935ee172559cc1794a9e7953909ec38ab76de16fa24fa650564d2fb56208546f0487f1deeb589b789ce9f8878647f55a87e

Malware Config

Targets

    • Target

      ff13e3fc4f3d2d9f23e5eb36af4d5728e1c10cbfef4b390aa9d01342904fe018.apk

    • Size

      3.0MB

    • MD5

      872edf75f8f915c5308dd155aa81a063

    • SHA1

      facef6d39be6ab133e1bf99fa5f78d5131cf74d3

    • SHA256

      ff13e3fc4f3d2d9f23e5eb36af4d5728e1c10cbfef4b390aa9d01342904fe018

    • SHA512

      eac92165f1d1f1334aea43e1a5439935ee172559cc1794a9e7953909ec38ab76de16fa24fa650564d2fb56208546f0487f1deeb589b789ce9f8878647f55a87e

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks