General

  • Target

    b3406beb0c6a2c9ed4e582be6857092235f29f34c0a22b1be5bfd911cf2e0026.apk

  • Size

    3.0MB

  • Sample

    210809-7b5svy23dn

  • MD5

    6e08fd5dc3f9200b0cfa6290211df9c8

  • SHA1

    827b804ab5d38216a9aec21da6d382dc77a6451f

  • SHA256

    b3406beb0c6a2c9ed4e582be6857092235f29f34c0a22b1be5bfd911cf2e0026

  • SHA512

    3ad6add02639ea6b40b04f3558d1e2f271ae32ecd34ed45a5f0deb5bd557963b37465dba0cce7a86a7246957380f676cb3be9377663d39c6c88c3ff30c00211e

Malware Config

Targets

    • Target

      b3406beb0c6a2c9ed4e582be6857092235f29f34c0a22b1be5bfd911cf2e0026.apk

    • Size

      3.0MB

    • MD5

      6e08fd5dc3f9200b0cfa6290211df9c8

    • SHA1

      827b804ab5d38216a9aec21da6d382dc77a6451f

    • SHA256

      b3406beb0c6a2c9ed4e582be6857092235f29f34c0a22b1be5bfd911cf2e0026

    • SHA512

      3ad6add02639ea6b40b04f3558d1e2f271ae32ecd34ed45a5f0deb5bd557963b37465dba0cce7a86a7246957380f676cb3be9377663d39c6c88c3ff30c00211e

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks