General

  • Target

    3f75ef05607ef774a67d166fa4c4423d78aa7261cf358349724becd61cfb60b9.apk

  • Size

    3.3MB

  • Sample

    210804-xyvtg7yvqj

  • MD5

    9d86dcf5cfd1bb172a6545d16911b28f

  • SHA1

    2246c62644637e835fc12fff779f55d04e99f081

  • SHA256

    3f75ef05607ef774a67d166fa4c4423d78aa7261cf358349724becd61cfb60b9

  • SHA512

    8a0350caf9da0cc304d3d2c78bbf15ccd85ac99ea2cc1dcecc171fe1585af3804c6525ee6cf38b059a4d0fccf9297c6b938777e64d9be060f6157f30c52fc56d

Malware Config

Targets

    • Target

      3f75ef05607ef774a67d166fa4c4423d78aa7261cf358349724becd61cfb60b9.apk

    • Size

      3.3MB

    • MD5

      9d86dcf5cfd1bb172a6545d16911b28f

    • SHA1

      2246c62644637e835fc12fff779f55d04e99f081

    • SHA256

      3f75ef05607ef774a67d166fa4c4423d78aa7261cf358349724becd61cfb60b9

    • SHA512

      8a0350caf9da0cc304d3d2c78bbf15ccd85ac99ea2cc1dcecc171fe1585af3804c6525ee6cf38b059a4d0fccf9297c6b938777e64d9be060f6157f30c52fc56d

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks