General

  • Target

    34fa8ba91e4cdd55310c9be7ea50e027fa9595038330c38590cb322d2f18f7d1.apk

  • Size

    3.8MB

  • Sample

    210728-w31a5edl6a

  • MD5

    9cd8ee4c4e75a2d35f70a3e8a117e88f

  • SHA1

    c7a2612a11828abae920b3d3c2db05938567c3ac

  • SHA256

    34fa8ba91e4cdd55310c9be7ea50e027fa9595038330c38590cb322d2f18f7d1

  • SHA512

    885e031a3d14b4e93ed398f76679848f2ce66214b7c2729fa20562f9697998233d0bf0e2c7b4dea8ff35bb161a6b2b6b1ee32ef65f7283ba28b05178fe5517fa

Malware Config

Targets

    • Target

      34fa8ba91e4cdd55310c9be7ea50e027fa9595038330c38590cb322d2f18f7d1.apk

    • Size

      3.8MB

    • MD5

      9cd8ee4c4e75a2d35f70a3e8a117e88f

    • SHA1

      c7a2612a11828abae920b3d3c2db05938567c3ac

    • SHA256

      34fa8ba91e4cdd55310c9be7ea50e027fa9595038330c38590cb322d2f18f7d1

    • SHA512

      885e031a3d14b4e93ed398f76679848f2ce66214b7c2729fa20562f9697998233d0bf0e2c7b4dea8ff35bb161a6b2b6b1ee32ef65f7283ba28b05178fe5517fa

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks