General

  • Target

    d638b28a5e20302569710f8cef556756154c4e935c5fba37a5fea722e4522ec7.apk

  • Size

    3.7MB

  • Sample

    210804-r3qwtbvbyn

  • MD5

    876dec97fdd1e23556bbf01bb3b9fdb1

  • SHA1

    d668b2eec0d52465e4ee1dd3ff713e33414fd9cb

  • SHA256

    d638b28a5e20302569710f8cef556756154c4e935c5fba37a5fea722e4522ec7

  • SHA512

    670d44f473f70fb4644c580cb430c9c4f98620b6521b05efba39e62c4d919cfd5938a5ac64332c0c583c086d45c994ca7ca079af13773bbf477b06775b37ed7c

Malware Config

Targets

    • Target

      d638b28a5e20302569710f8cef556756154c4e935c5fba37a5fea722e4522ec7.apk

    • Size

      3.7MB

    • MD5

      876dec97fdd1e23556bbf01bb3b9fdb1

    • SHA1

      d668b2eec0d52465e4ee1dd3ff713e33414fd9cb

    • SHA256

      d638b28a5e20302569710f8cef556756154c4e935c5fba37a5fea722e4522ec7

    • SHA512

      670d44f473f70fb4644c580cb430c9c4f98620b6521b05efba39e62c4d919cfd5938a5ac64332c0c583c086d45c994ca7ca079af13773bbf477b06775b37ed7c

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks