General

  • Target

    b1cdc6432f0b8bc8b25c6000ad5d7789744fb329886d617c4781ed691afcb793.apk

  • Size

    4.4MB

  • Sample

    210805-1yhm8ws99j

  • MD5

    d06a7d4bbcbb2e9b23b33197fc674a4c

  • SHA1

    ddc532b593861e2e16ed21692ffe5f4dcca7fd17

  • SHA256

    b1cdc6432f0b8bc8b25c6000ad5d7789744fb329886d617c4781ed691afcb793

  • SHA512

    56d6b23e9c0b6f359a711a9268625b253be830bf88b4afa25ec15787c81d987a2dc7a4bdcdbe91a56fe57ddd4f72483f2aa3627c800ee4f7524b6f540af12446

Malware Config

Targets

    • Target

      b1cdc6432f0b8bc8b25c6000ad5d7789744fb329886d617c4781ed691afcb793.apk

    • Size

      4.4MB

    • MD5

      d06a7d4bbcbb2e9b23b33197fc674a4c

    • SHA1

      ddc532b593861e2e16ed21692ffe5f4dcca7fd17

    • SHA256

      b1cdc6432f0b8bc8b25c6000ad5d7789744fb329886d617c4781ed691afcb793

    • SHA512

      56d6b23e9c0b6f359a711a9268625b253be830bf88b4afa25ec15787c81d987a2dc7a4bdcdbe91a56fe57ddd4f72483f2aa3627c800ee4f7524b6f540af12446

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks