General

  • Target

    ae8877b889537821a10ca3151dd658e7405c769272b082befbede94e186de4f9.apk

  • Size

    3.4MB

  • Sample

    210804-jhcst5xck6

  • MD5

    80b71ae1e1240ca23b6843f698570b2a

  • SHA1

    4b95f81ebb35c172043c20edee427812122f8e4b

  • SHA256

    ae8877b889537821a10ca3151dd658e7405c769272b082befbede94e186de4f9

  • SHA512

    70d0be1ce30a23ecff3df96ebef72495697707d648a69b0b7bb6b26b57f801d2d29e73709ef3ea2054be62f33b6063d1b4b99d7b3bbb01600bfdd653f31c7d47

Malware Config

Targets

    • Target

      ae8877b889537821a10ca3151dd658e7405c769272b082befbede94e186de4f9.apk

    • Size

      3.4MB

    • MD5

      80b71ae1e1240ca23b6843f698570b2a

    • SHA1

      4b95f81ebb35c172043c20edee427812122f8e4b

    • SHA256

      ae8877b889537821a10ca3151dd658e7405c769272b082befbede94e186de4f9

    • SHA512

      70d0be1ce30a23ecff3df96ebef72495697707d648a69b0b7bb6b26b57f801d2d29e73709ef3ea2054be62f33b6063d1b4b99d7b3bbb01600bfdd653f31c7d47

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks