General

  • Target

    10c1c7b0ddb1af5a49e62e395679dc805fb472cc22d2ce0f41a357b7816666a0.apk

  • Size

    4.5MB

  • Sample

    210721-lccq38fcae

  • MD5

    0d5deafdac710e48c38f5a0442b09dea

  • SHA1

    5969805e4ed2c36670f8674abd918fe5b78a6a40

  • SHA256

    10c1c7b0ddb1af5a49e62e395679dc805fb472cc22d2ce0f41a357b7816666a0

  • SHA512

    5ebcb1d79bd3e2d172fff433ae444c0cbd9ad6eb8c272117a51eb3827f84f20c5b14c69e1425effc8fc030f1ca0c6fde9afa58d6158a8e34029cb94cfc44e06a

Malware Config

Targets

    • Target

      10c1c7b0ddb1af5a49e62e395679dc805fb472cc22d2ce0f41a357b7816666a0.apk

    • Size

      4.5MB

    • MD5

      0d5deafdac710e48c38f5a0442b09dea

    • SHA1

      5969805e4ed2c36670f8674abd918fe5b78a6a40

    • SHA256

      10c1c7b0ddb1af5a49e62e395679dc805fb472cc22d2ce0f41a357b7816666a0

    • SHA512

      5ebcb1d79bd3e2d172fff433ae444c0cbd9ad6eb8c272117a51eb3827f84f20c5b14c69e1425effc8fc030f1ca0c6fde9afa58d6158a8e34029cb94cfc44e06a

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks