General

  • Target

    586c9783ae79e6ee0aceecc4937a1d47c8ab011aba48981a28e0f4579a6ad3ed.apk

  • Size

    3.8MB

  • Sample

    210730-8lyfwnnmmj

  • MD5

    f6658ffb557d6141f3fd6e1c6b611330

  • SHA1

    df6f00a0d912ea8807bbdc6fd8c3e5d2b12c96ea

  • SHA256

    586c9783ae79e6ee0aceecc4937a1d47c8ab011aba48981a28e0f4579a6ad3ed

  • SHA512

    9e1b926a532d778259ee615406b6b512c3acc79628516523f0fd4722a858e4f39c6c09d9e15b863df10ed7a5382c9cc8c37736baeee99efb7b7060ebc2d37e7c

Malware Config

Targets

    • Target

      586c9783ae79e6ee0aceecc4937a1d47c8ab011aba48981a28e0f4579a6ad3ed.apk

    • Size

      3.8MB

    • MD5

      f6658ffb557d6141f3fd6e1c6b611330

    • SHA1

      df6f00a0d912ea8807bbdc6fd8c3e5d2b12c96ea

    • SHA256

      586c9783ae79e6ee0aceecc4937a1d47c8ab011aba48981a28e0f4579a6ad3ed

    • SHA512

      9e1b926a532d778259ee615406b6b512c3acc79628516523f0fd4722a858e4f39c6c09d9e15b863df10ed7a5382c9cc8c37736baeee99efb7b7060ebc2d37e7c

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks