General
-
Target
3f75ef05607ef774a67d166fa4c4423d78aa7261cf358349724becd61cfb60b9.apk
-
Size
3.3MB
-
Sample
210804-xyvtg7yvqj
-
MD5
9d86dcf5cfd1bb172a6545d16911b28f
-
SHA1
2246c62644637e835fc12fff779f55d04e99f081
-
SHA256
3f75ef05607ef774a67d166fa4c4423d78aa7261cf358349724becd61cfb60b9
-
SHA512
8a0350caf9da0cc304d3d2c78bbf15ccd85ac99ea2cc1dcecc171fe1585af3804c6525ee6cf38b059a4d0fccf9297c6b938777e64d9be060f6157f30c52fc56d
Static task
static1
Behavioral task
behavioral1
Sample
3f75ef05607ef774a67d166fa4c4423d78aa7261cf358349724becd61cfb60b9.apk
Resource
android-x64-arm64
Malware Config
Targets
-
-
Target
3f75ef05607ef774a67d166fa4c4423d78aa7261cf358349724becd61cfb60b9.apk
-
Size
3.3MB
-
MD5
9d86dcf5cfd1bb172a6545d16911b28f
-
SHA1
2246c62644637e835fc12fff779f55d04e99f081
-
SHA256
3f75ef05607ef774a67d166fa4c4423d78aa7261cf358349724becd61cfb60b9
-
SHA512
8a0350caf9da0cc304d3d2c78bbf15ccd85ac99ea2cc1dcecc171fe1585af3804c6525ee6cf38b059a4d0fccf9297c6b938777e64d9be060f6157f30c52fc56d
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-