General
-
Target
ae8877b889537821a10ca3151dd658e7405c769272b082befbede94e186de4f9.apk
-
Size
3.4MB
-
Sample
210804-jhcst5xck6
-
MD5
80b71ae1e1240ca23b6843f698570b2a
-
SHA1
4b95f81ebb35c172043c20edee427812122f8e4b
-
SHA256
ae8877b889537821a10ca3151dd658e7405c769272b082befbede94e186de4f9
-
SHA512
70d0be1ce30a23ecff3df96ebef72495697707d648a69b0b7bb6b26b57f801d2d29e73709ef3ea2054be62f33b6063d1b4b99d7b3bbb01600bfdd653f31c7d47
Static task
static1
Behavioral task
behavioral1
Sample
ae8877b889537821a10ca3151dd658e7405c769272b082befbede94e186de4f9.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
ae8877b889537821a10ca3151dd658e7405c769272b082befbede94e186de4f9.apk
-
Size
3.4MB
-
MD5
80b71ae1e1240ca23b6843f698570b2a
-
SHA1
4b95f81ebb35c172043c20edee427812122f8e4b
-
SHA256
ae8877b889537821a10ca3151dd658e7405c769272b082befbede94e186de4f9
-
SHA512
70d0be1ce30a23ecff3df96ebef72495697707d648a69b0b7bb6b26b57f801d2d29e73709ef3ea2054be62f33b6063d1b4b99d7b3bbb01600bfdd653f31c7d47
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-