General
-
Target
c95ae9055f73f40fb351d3d4947b4beea8f453e4b342677650e81c8e5b021d36.apk
-
Size
4.5MB
-
Sample
210721-kjqa96jhya
-
MD5
a5a7ddf2e89bf2c6e355ff81fef723da
-
SHA1
bd06ce0a2085e992b00bea1a4f19d61549233f34
-
SHA256
c95ae9055f73f40fb351d3d4947b4beea8f453e4b342677650e81c8e5b021d36
-
SHA512
fc5a80b0058d52a93f2d4675a36ff75c4344eb29bfe0316951d309cd4d4a014d9a6c5bd465832df153643a39d5ae0981c2620d03b21ce97af03a9378842cbb99
Static task
static1
Behavioral task
behavioral1
Sample
c95ae9055f73f40fb351d3d4947b4beea8f453e4b342677650e81c8e5b021d36.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
c95ae9055f73f40fb351d3d4947b4beea8f453e4b342677650e81c8e5b021d36.apk
-
Size
4.5MB
-
MD5
a5a7ddf2e89bf2c6e355ff81fef723da
-
SHA1
bd06ce0a2085e992b00bea1a4f19d61549233f34
-
SHA256
c95ae9055f73f40fb351d3d4947b4beea8f453e4b342677650e81c8e5b021d36
-
SHA512
fc5a80b0058d52a93f2d4675a36ff75c4344eb29bfe0316951d309cd4d4a014d9a6c5bd465832df153643a39d5ae0981c2620d03b21ce97af03a9378842cbb99
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-