General
-
Target
81d09b68ccddda05085807a382bc7f87024eb53030b84abf29d5cb99341471dc.apk
-
Size
4.5MB
-
Sample
210721-5dk3gmfyfx
-
MD5
de8c38f483bfba1f632f74ef3233ad04
-
SHA1
9bb92968b432c31bceee7265bd73ef9ff9602e67
-
SHA256
81d09b68ccddda05085807a382bc7f87024eb53030b84abf29d5cb99341471dc
-
SHA512
bce8f34db119369c12763200b3fb35a49aa980577ae3412b468089c856674a45493448d729d73fbfe213d2cf59c00e7f3c1377e55fd96fe42444560ca6dbfa35
Static task
static1
Behavioral task
behavioral1
Sample
81d09b68ccddda05085807a382bc7f87024eb53030b84abf29d5cb99341471dc.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
81d09b68ccddda05085807a382bc7f87024eb53030b84abf29d5cb99341471dc.apk
-
Size
4.5MB
-
MD5
de8c38f483bfba1f632f74ef3233ad04
-
SHA1
9bb92968b432c31bceee7265bd73ef9ff9602e67
-
SHA256
81d09b68ccddda05085807a382bc7f87024eb53030b84abf29d5cb99341471dc
-
SHA512
bce8f34db119369c12763200b3fb35a49aa980577ae3412b468089c856674a45493448d729d73fbfe213d2cf59c00e7f3c1377e55fd96fe42444560ca6dbfa35
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-