General
-
Target
b1cdc6432f0b8bc8b25c6000ad5d7789744fb329886d617c4781ed691afcb793.apk
-
Size
4.4MB
-
Sample
210805-1yhm8ws99j
-
MD5
d06a7d4bbcbb2e9b23b33197fc674a4c
-
SHA1
ddc532b593861e2e16ed21692ffe5f4dcca7fd17
-
SHA256
b1cdc6432f0b8bc8b25c6000ad5d7789744fb329886d617c4781ed691afcb793
-
SHA512
56d6b23e9c0b6f359a711a9268625b253be830bf88b4afa25ec15787c81d987a2dc7a4bdcdbe91a56fe57ddd4f72483f2aa3627c800ee4f7524b6f540af12446
Static task
static1
Behavioral task
behavioral1
Sample
b1cdc6432f0b8bc8b25c6000ad5d7789744fb329886d617c4781ed691afcb793.apk
Resource
android-x86-arm
Malware Config
Targets
-
-
Target
b1cdc6432f0b8bc8b25c6000ad5d7789744fb329886d617c4781ed691afcb793.apk
-
Size
4.4MB
-
MD5
d06a7d4bbcbb2e9b23b33197fc674a4c
-
SHA1
ddc532b593861e2e16ed21692ffe5f4dcca7fd17
-
SHA256
b1cdc6432f0b8bc8b25c6000ad5d7789744fb329886d617c4781ed691afcb793
-
SHA512
56d6b23e9c0b6f359a711a9268625b253be830bf88b4afa25ec15787c81d987a2dc7a4bdcdbe91a56fe57ddd4f72483f2aa3627c800ee4f7524b6f540af12446
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-