General
-
Target
a778818cc08d213d1f66db5fa8b34aabc862569ecb99fd1aea37ff6ccab48400.apk
-
Size
3.3MB
-
Sample
210730-qt9dehzcqj
-
MD5
15328ea6d31bef8ddd15a81e0f5a549b
-
SHA1
c52f12651d91a9bf0d625a879b34d194eba69ed4
-
SHA256
a778818cc08d213d1f66db5fa8b34aabc862569ecb99fd1aea37ff6ccab48400
-
SHA512
5939a527d289315ff6d354bbd6e834ae9b3f452aebc54114a0fb46cb5422e5537ff0592aa62fbd20d753162f6a3ae56cfd97c4320613d1377a9b5a7d6a525336
Static task
static1
Behavioral task
behavioral1
Sample
a778818cc08d213d1f66db5fa8b34aabc862569ecb99fd1aea37ff6ccab48400.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
a778818cc08d213d1f66db5fa8b34aabc862569ecb99fd1aea37ff6ccab48400.apk
-
Size
3.3MB
-
MD5
15328ea6d31bef8ddd15a81e0f5a549b
-
SHA1
c52f12651d91a9bf0d625a879b34d194eba69ed4
-
SHA256
a778818cc08d213d1f66db5fa8b34aabc862569ecb99fd1aea37ff6ccab48400
-
SHA512
5939a527d289315ff6d354bbd6e834ae9b3f452aebc54114a0fb46cb5422e5537ff0592aa62fbd20d753162f6a3ae56cfd97c4320613d1377a9b5a7d6a525336
-
FluBot Payload
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-