General

  • Target

    a778818cc08d213d1f66db5fa8b34aabc862569ecb99fd1aea37ff6ccab48400.apk

  • Size

    3.3MB

  • Sample

    210730-qt9dehzcqj

  • MD5

    15328ea6d31bef8ddd15a81e0f5a549b

  • SHA1

    c52f12651d91a9bf0d625a879b34d194eba69ed4

  • SHA256

    a778818cc08d213d1f66db5fa8b34aabc862569ecb99fd1aea37ff6ccab48400

  • SHA512

    5939a527d289315ff6d354bbd6e834ae9b3f452aebc54114a0fb46cb5422e5537ff0592aa62fbd20d753162f6a3ae56cfd97c4320613d1377a9b5a7d6a525336

Malware Config

Targets

    • Target

      a778818cc08d213d1f66db5fa8b34aabc862569ecb99fd1aea37ff6ccab48400.apk

    • Size

      3.3MB

    • MD5

      15328ea6d31bef8ddd15a81e0f5a549b

    • SHA1

      c52f12651d91a9bf0d625a879b34d194eba69ed4

    • SHA256

      a778818cc08d213d1f66db5fa8b34aabc862569ecb99fd1aea37ff6ccab48400

    • SHA512

      5939a527d289315ff6d354bbd6e834ae9b3f452aebc54114a0fb46cb5422e5537ff0592aa62fbd20d753162f6a3ae56cfd97c4320613d1377a9b5a7d6a525336

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks