General

  • Target

    ba093d23855cbecfa902dc510388b3e42a94c25843460b75c0118b42a650b0e0.apk

  • Size

    4.5MB

  • Sample

    210721-zgp3fzw2h2

  • MD5

    1778c943fbaa21617934c0c1bee831a5

  • SHA1

    c8b587c87b9a02c3a85ddb1a0d2c8faf1cfc8bf9

  • SHA256

    ba093d23855cbecfa902dc510388b3e42a94c25843460b75c0118b42a650b0e0

  • SHA512

    8596240a795c3fe3834bb22a89174338d341f075126ec698cdb68100e3071feecc6cee272f614049510b04709ea0a61984d765f023f66c806971b6af0808fa8f

Malware Config

Targets

    • Target

      ba093d23855cbecfa902dc510388b3e42a94c25843460b75c0118b42a650b0e0.apk

    • Size

      4.5MB

    • MD5

      1778c943fbaa21617934c0c1bee831a5

    • SHA1

      c8b587c87b9a02c3a85ddb1a0d2c8faf1cfc8bf9

    • SHA256

      ba093d23855cbecfa902dc510388b3e42a94c25843460b75c0118b42a650b0e0

    • SHA512

      8596240a795c3fe3834bb22a89174338d341f075126ec698cdb68100e3071feecc6cee272f614049510b04709ea0a61984d765f023f66c806971b6af0808fa8f

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks