General

  • Target

    79673f2646bcd63b202ee23ba79e86e55a284126c918a444e1d461294d6d158e.apk

  • Size

    3.0MB

  • Sample

    210729-1pbeswegp6

  • MD5

    fd0b4e6dfac82f85ab27b3d42baeb313

  • SHA1

    404ae8f4bec4233cd189f24998dfa87630e65a88

  • SHA256

    79673f2646bcd63b202ee23ba79e86e55a284126c918a444e1d461294d6d158e

  • SHA512

    26825985f52d512dd0ba86bbb4f2c4ceb69aaefc53f42afddebfe567e0a13d19764fca8b53f57898503fd38d40d3868c7307d20e8d1f8aba0943cb72d82c0da9

Malware Config

Targets

    • Target

      79673f2646bcd63b202ee23ba79e86e55a284126c918a444e1d461294d6d158e.apk

    • Size

      3.0MB

    • MD5

      fd0b4e6dfac82f85ab27b3d42baeb313

    • SHA1

      404ae8f4bec4233cd189f24998dfa87630e65a88

    • SHA256

      79673f2646bcd63b202ee23ba79e86e55a284126c918a444e1d461294d6d158e

    • SHA512

      26825985f52d512dd0ba86bbb4f2c4ceb69aaefc53f42afddebfe567e0a13d19764fca8b53f57898503fd38d40d3868c7307d20e8d1f8aba0943cb72d82c0da9

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks