General

  • Target

    fa8f5ad27fa78a48dfe12c0b839fafbd0fef596a33848d5dc491b29479a4967b.apk

  • Size

    4.0MB

  • Sample

    210730-vfe5lx5ak2

  • MD5

    94d5322568b95b257742180764059ca0

  • SHA1

    903121334205895d6c5ac2ba28fe3c91d8640ad3

  • SHA256

    fa8f5ad27fa78a48dfe12c0b839fafbd0fef596a33848d5dc491b29479a4967b

  • SHA512

    e39299fc55d4d7285f410da63b9b519ab9085b5eb1cf901e2aca712f4af815fd6d742848dbb5f0dff8b3898cce6a0ff87c6f65e994fe38dd0aee17bc7dd8b15d

Malware Config

Targets

    • Target

      fa8f5ad27fa78a48dfe12c0b839fafbd0fef596a33848d5dc491b29479a4967b.apk

    • Size

      4.0MB

    • MD5

      94d5322568b95b257742180764059ca0

    • SHA1

      903121334205895d6c5ac2ba28fe3c91d8640ad3

    • SHA256

      fa8f5ad27fa78a48dfe12c0b839fafbd0fef596a33848d5dc491b29479a4967b

    • SHA512

      e39299fc55d4d7285f410da63b9b519ab9085b5eb1cf901e2aca712f4af815fd6d742848dbb5f0dff8b3898cce6a0ff87c6f65e994fe38dd0aee17bc7dd8b15d

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks