General

  • Target

    b91c5e98d23c71260a72e3fa2f88fbff0667241a49af4cebac8c40d55d47eba5.apk

  • Size

    3.0MB

  • Sample

    210721-b3ch1vwrrn

  • MD5

    76cf820d20cb010e463c869e2f23002c

  • SHA1

    4c9d326dec4aa26b93eae4f6da478b0f87ad43c9

  • SHA256

    b91c5e98d23c71260a72e3fa2f88fbff0667241a49af4cebac8c40d55d47eba5

  • SHA512

    77547d22bcec2ca992a43c12df938bd70df2c101b04b5f4234b586b1c8e110dde3c7e440c4715dcfbc85bec0b1d37bbaacd7222f667acee6f008dc308666057a

Malware Config

Targets

    • Target

      b91c5e98d23c71260a72e3fa2f88fbff0667241a49af4cebac8c40d55d47eba5.apk

    • Size

      3.0MB

    • MD5

      76cf820d20cb010e463c869e2f23002c

    • SHA1

      4c9d326dec4aa26b93eae4f6da478b0f87ad43c9

    • SHA256

      b91c5e98d23c71260a72e3fa2f88fbff0667241a49af4cebac8c40d55d47eba5

    • SHA512

      77547d22bcec2ca992a43c12df938bd70df2c101b04b5f4234b586b1c8e110dde3c7e440c4715dcfbc85bec0b1d37bbaacd7222f667acee6f008dc308666057a

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks