General

  • Target

    c95ae9055f73f40fb351d3d4947b4beea8f453e4b342677650e81c8e5b021d36.apk

  • Size

    4.5MB

  • Sample

    210721-kjqa96jhya

  • MD5

    a5a7ddf2e89bf2c6e355ff81fef723da

  • SHA1

    bd06ce0a2085e992b00bea1a4f19d61549233f34

  • SHA256

    c95ae9055f73f40fb351d3d4947b4beea8f453e4b342677650e81c8e5b021d36

  • SHA512

    fc5a80b0058d52a93f2d4675a36ff75c4344eb29bfe0316951d309cd4d4a014d9a6c5bd465832df153643a39d5ae0981c2620d03b21ce97af03a9378842cbb99

Malware Config

Targets

    • Target

      c95ae9055f73f40fb351d3d4947b4beea8f453e4b342677650e81c8e5b021d36.apk

    • Size

      4.5MB

    • MD5

      a5a7ddf2e89bf2c6e355ff81fef723da

    • SHA1

      bd06ce0a2085e992b00bea1a4f19d61549233f34

    • SHA256

      c95ae9055f73f40fb351d3d4947b4beea8f453e4b342677650e81c8e5b021d36

    • SHA512

      fc5a80b0058d52a93f2d4675a36ff75c4344eb29bfe0316951d309cd4d4a014d9a6c5bd465832df153643a39d5ae0981c2620d03b21ce97af03a9378842cbb99

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks