General
-
Target
79673f2646bcd63b202ee23ba79e86e55a284126c918a444e1d461294d6d158e.apk
-
Size
3.0MB
-
Sample
210729-1pbeswegp6
-
MD5
fd0b4e6dfac82f85ab27b3d42baeb313
-
SHA1
404ae8f4bec4233cd189f24998dfa87630e65a88
-
SHA256
79673f2646bcd63b202ee23ba79e86e55a284126c918a444e1d461294d6d158e
-
SHA512
26825985f52d512dd0ba86bbb4f2c4ceb69aaefc53f42afddebfe567e0a13d19764fca8b53f57898503fd38d40d3868c7307d20e8d1f8aba0943cb72d82c0da9
Static task
static1
Behavioral task
behavioral1
Sample
79673f2646bcd63b202ee23ba79e86e55a284126c918a444e1d461294d6d158e.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
79673f2646bcd63b202ee23ba79e86e55a284126c918a444e1d461294d6d158e.apk
-
Size
3.0MB
-
MD5
fd0b4e6dfac82f85ab27b3d42baeb313
-
SHA1
404ae8f4bec4233cd189f24998dfa87630e65a88
-
SHA256
79673f2646bcd63b202ee23ba79e86e55a284126c918a444e1d461294d6d158e
-
SHA512
26825985f52d512dd0ba86bbb4f2c4ceb69aaefc53f42afddebfe567e0a13d19764fca8b53f57898503fd38d40d3868c7307d20e8d1f8aba0943cb72d82c0da9
-
FluBot Payload
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-