General

  • Target

    02de6eceb8204fccd22d83f3d7cf2b6c8a24042c305e19c638fd1a2c60ed91df.apk

  • Size

    3.9MB

  • Sample

    210730-5ek97wnekj

  • MD5

    b9b9857cde65ff58bbd8b4eb85216b65

  • SHA1

    e5e785c56a8371e678c2f2a4b6dcf22aa458547f

  • SHA256

    02de6eceb8204fccd22d83f3d7cf2b6c8a24042c305e19c638fd1a2c60ed91df

  • SHA512

    63195e9d2157012cec14cfafe1f20f13e480aa41187c5a5c4c23681d09b0a09eeefa48ddcd3a0326cfa35dfe41c6082b825d23ac5aeceb9618d31eb9dd2f97f2

Malware Config

Targets

    • Target

      02de6eceb8204fccd22d83f3d7cf2b6c8a24042c305e19c638fd1a2c60ed91df.apk

    • Size

      3.9MB

    • MD5

      b9b9857cde65ff58bbd8b4eb85216b65

    • SHA1

      e5e785c56a8371e678c2f2a4b6dcf22aa458547f

    • SHA256

      02de6eceb8204fccd22d83f3d7cf2b6c8a24042c305e19c638fd1a2c60ed91df

    • SHA512

      63195e9d2157012cec14cfafe1f20f13e480aa41187c5a5c4c23681d09b0a09eeefa48ddcd3a0326cfa35dfe41c6082b825d23ac5aeceb9618d31eb9dd2f97f2

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks