General
-
Target
3af09471651657aa2c920632b43bf8df0dd9ebb5d6b2b1d066e3d535f3a1bf0f.apk
-
Size
3.0MB
-
Sample
210728-mhawr2xp36
-
MD5
ec374cf1188eaeef4121d2137474934e
-
SHA1
7e1064280f1367bbb6d7b3e08693405ce4118049
-
SHA256
3af09471651657aa2c920632b43bf8df0dd9ebb5d6b2b1d066e3d535f3a1bf0f
-
SHA512
e9b6538ccbff909fcc47a2674d1150a3818992e618761596efff33998cec679b3db9b7324afc537dadb989961db89b9a94b36a057a5ee4808c498c102f8006e3
Static task
static1
Behavioral task
behavioral1
Sample
3af09471651657aa2c920632b43bf8df0dd9ebb5d6b2b1d066e3d535f3a1bf0f.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
3af09471651657aa2c920632b43bf8df0dd9ebb5d6b2b1d066e3d535f3a1bf0f.apk
-
Size
3.0MB
-
MD5
ec374cf1188eaeef4121d2137474934e
-
SHA1
7e1064280f1367bbb6d7b3e08693405ce4118049
-
SHA256
3af09471651657aa2c920632b43bf8df0dd9ebb5d6b2b1d066e3d535f3a1bf0f
-
SHA512
e9b6538ccbff909fcc47a2674d1150a3818992e618761596efff33998cec679b3db9b7324afc537dadb989961db89b9a94b36a057a5ee4808c498c102f8006e3
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-