General
-
Target
b3406beb0c6a2c9ed4e582be6857092235f29f34c0a22b1be5bfd911cf2e0026.apk
-
Size
3.0MB
-
Sample
210809-7b5svy23dn
-
MD5
6e08fd5dc3f9200b0cfa6290211df9c8
-
SHA1
827b804ab5d38216a9aec21da6d382dc77a6451f
-
SHA256
b3406beb0c6a2c9ed4e582be6857092235f29f34c0a22b1be5bfd911cf2e0026
-
SHA512
3ad6add02639ea6b40b04f3558d1e2f271ae32ecd34ed45a5f0deb5bd557963b37465dba0cce7a86a7246957380f676cb3be9377663d39c6c88c3ff30c00211e
Static task
static1
Behavioral task
behavioral1
Sample
b3406beb0c6a2c9ed4e582be6857092235f29f34c0a22b1be5bfd911cf2e0026.apk
Resource
android-x64-arm64
Malware Config
Targets
-
-
Target
b3406beb0c6a2c9ed4e582be6857092235f29f34c0a22b1be5bfd911cf2e0026.apk
-
Size
3.0MB
-
MD5
6e08fd5dc3f9200b0cfa6290211df9c8
-
SHA1
827b804ab5d38216a9aec21da6d382dc77a6451f
-
SHA256
b3406beb0c6a2c9ed4e582be6857092235f29f34c0a22b1be5bfd911cf2e0026
-
SHA512
3ad6add02639ea6b40b04f3558d1e2f271ae32ecd34ed45a5f0deb5bd557963b37465dba0cce7a86a7246957380f676cb3be9377663d39c6c88c3ff30c00211e
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-