General
-
Target
fa8f5ad27fa78a48dfe12c0b839fafbd0fef596a33848d5dc491b29479a4967b.apk
-
Size
4.0MB
-
Sample
210730-vfe5lx5ak2
-
MD5
94d5322568b95b257742180764059ca0
-
SHA1
903121334205895d6c5ac2ba28fe3c91d8640ad3
-
SHA256
fa8f5ad27fa78a48dfe12c0b839fafbd0fef596a33848d5dc491b29479a4967b
-
SHA512
e39299fc55d4d7285f410da63b9b519ab9085b5eb1cf901e2aca712f4af815fd6d742848dbb5f0dff8b3898cce6a0ff87c6f65e994fe38dd0aee17bc7dd8b15d
Static task
static1
Behavioral task
behavioral1
Sample
fa8f5ad27fa78a48dfe12c0b839fafbd0fef596a33848d5dc491b29479a4967b.apk
Resource
android-x86-arm
Malware Config
Targets
-
-
Target
fa8f5ad27fa78a48dfe12c0b839fafbd0fef596a33848d5dc491b29479a4967b.apk
-
Size
4.0MB
-
MD5
94d5322568b95b257742180764059ca0
-
SHA1
903121334205895d6c5ac2ba28fe3c91d8640ad3
-
SHA256
fa8f5ad27fa78a48dfe12c0b839fafbd0fef596a33848d5dc491b29479a4967b
-
SHA512
e39299fc55d4d7285f410da63b9b519ab9085b5eb1cf901e2aca712f4af815fd6d742848dbb5f0dff8b3898cce6a0ff87c6f65e994fe38dd0aee17bc7dd8b15d
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-