General

  • Target

    3af09471651657aa2c920632b43bf8df0dd9ebb5d6b2b1d066e3d535f3a1bf0f.apk

  • Size

    3.0MB

  • Sample

    210728-mhawr2xp36

  • MD5

    ec374cf1188eaeef4121d2137474934e

  • SHA1

    7e1064280f1367bbb6d7b3e08693405ce4118049

  • SHA256

    3af09471651657aa2c920632b43bf8df0dd9ebb5d6b2b1d066e3d535f3a1bf0f

  • SHA512

    e9b6538ccbff909fcc47a2674d1150a3818992e618761596efff33998cec679b3db9b7324afc537dadb989961db89b9a94b36a057a5ee4808c498c102f8006e3

Malware Config

Targets

    • Target

      3af09471651657aa2c920632b43bf8df0dd9ebb5d6b2b1d066e3d535f3a1bf0f.apk

    • Size

      3.0MB

    • MD5

      ec374cf1188eaeef4121d2137474934e

    • SHA1

      7e1064280f1367bbb6d7b3e08693405ce4118049

    • SHA256

      3af09471651657aa2c920632b43bf8df0dd9ebb5d6b2b1d066e3d535f3a1bf0f

    • SHA512

      e9b6538ccbff909fcc47a2674d1150a3818992e618761596efff33998cec679b3db9b7324afc537dadb989961db89b9a94b36a057a5ee4808c498c102f8006e3

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks