General
-
Target
b91c5e98d23c71260a72e3fa2f88fbff0667241a49af4cebac8c40d55d47eba5.apk
-
Size
3.0MB
-
Sample
210721-b3ch1vwrrn
-
MD5
76cf820d20cb010e463c869e2f23002c
-
SHA1
4c9d326dec4aa26b93eae4f6da478b0f87ad43c9
-
SHA256
b91c5e98d23c71260a72e3fa2f88fbff0667241a49af4cebac8c40d55d47eba5
-
SHA512
77547d22bcec2ca992a43c12df938bd70df2c101b04b5f4234b586b1c8e110dde3c7e440c4715dcfbc85bec0b1d37bbaacd7222f667acee6f008dc308666057a
Static task
static1
Behavioral task
behavioral1
Sample
b91c5e98d23c71260a72e3fa2f88fbff0667241a49af4cebac8c40d55d47eba5.apk
Resource
android-x64-arm64
Malware Config
Targets
-
-
Target
b91c5e98d23c71260a72e3fa2f88fbff0667241a49af4cebac8c40d55d47eba5.apk
-
Size
3.0MB
-
MD5
76cf820d20cb010e463c869e2f23002c
-
SHA1
4c9d326dec4aa26b93eae4f6da478b0f87ad43c9
-
SHA256
b91c5e98d23c71260a72e3fa2f88fbff0667241a49af4cebac8c40d55d47eba5
-
SHA512
77547d22bcec2ca992a43c12df938bd70df2c101b04b5f4234b586b1c8e110dde3c7e440c4715dcfbc85bec0b1d37bbaacd7222f667acee6f008dc308666057a
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-