General

  • Target

    7b7d444527be2709a9068919ab59bf25e11ab357cd4ad731ecd10ad7f0b81ceb.apk

  • Size

    4.2MB

  • Sample

    210809-tjqv65zlge

  • MD5

    40f97a94af5fc5bd5ded862a97878603

  • SHA1

    d45dc7b8f0fe5c6e04cc4d1883bd3bf25ab54f63

  • SHA256

    7b7d444527be2709a9068919ab59bf25e11ab357cd4ad731ecd10ad7f0b81ceb

  • SHA512

    743a2b9fff5cd4d6bdce805057c554742345f71e191716f4cf6ffd020b34224c2ee932cd627a57ef8cee83f2a08c49ee0859316383c91a15db4240208594bae9

Malware Config

Targets

    • Target

      7b7d444527be2709a9068919ab59bf25e11ab357cd4ad731ecd10ad7f0b81ceb.apk

    • Size

      4.2MB

    • MD5

      40f97a94af5fc5bd5ded862a97878603

    • SHA1

      d45dc7b8f0fe5c6e04cc4d1883bd3bf25ab54f63

    • SHA256

      7b7d444527be2709a9068919ab59bf25e11ab357cd4ad731ecd10ad7f0b81ceb

    • SHA512

      743a2b9fff5cd4d6bdce805057c554742345f71e191716f4cf6ffd020b34224c2ee932cd627a57ef8cee83f2a08c49ee0859316383c91a15db4240208594bae9

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks