General
-
Target
ba093d23855cbecfa902dc510388b3e42a94c25843460b75c0118b42a650b0e0.apk
-
Size
4.5MB
-
Sample
210721-zgp3fzw2h2
-
MD5
1778c943fbaa21617934c0c1bee831a5
-
SHA1
c8b587c87b9a02c3a85ddb1a0d2c8faf1cfc8bf9
-
SHA256
ba093d23855cbecfa902dc510388b3e42a94c25843460b75c0118b42a650b0e0
-
SHA512
8596240a795c3fe3834bb22a89174338d341f075126ec698cdb68100e3071feecc6cee272f614049510b04709ea0a61984d765f023f66c806971b6af0808fa8f
Static task
static1
Behavioral task
behavioral1
Sample
ba093d23855cbecfa902dc510388b3e42a94c25843460b75c0118b42a650b0e0.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
ba093d23855cbecfa902dc510388b3e42a94c25843460b75c0118b42a650b0e0.apk
-
Size
4.5MB
-
MD5
1778c943fbaa21617934c0c1bee831a5
-
SHA1
c8b587c87b9a02c3a85ddb1a0d2c8faf1cfc8bf9
-
SHA256
ba093d23855cbecfa902dc510388b3e42a94c25843460b75c0118b42a650b0e0
-
SHA512
8596240a795c3fe3834bb22a89174338d341f075126ec698cdb68100e3071feecc6cee272f614049510b04709ea0a61984d765f023f66c806971b6af0808fa8f
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-