General
-
Target
7b7d444527be2709a9068919ab59bf25e11ab357cd4ad731ecd10ad7f0b81ceb.apk
-
Size
4.2MB
-
Sample
210809-tjqv65zlge
-
MD5
40f97a94af5fc5bd5ded862a97878603
-
SHA1
d45dc7b8f0fe5c6e04cc4d1883bd3bf25ab54f63
-
SHA256
7b7d444527be2709a9068919ab59bf25e11ab357cd4ad731ecd10ad7f0b81ceb
-
SHA512
743a2b9fff5cd4d6bdce805057c554742345f71e191716f4cf6ffd020b34224c2ee932cd627a57ef8cee83f2a08c49ee0859316383c91a15db4240208594bae9
Static task
static1
Behavioral task
behavioral1
Sample
7b7d444527be2709a9068919ab59bf25e11ab357cd4ad731ecd10ad7f0b81ceb.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
7b7d444527be2709a9068919ab59bf25e11ab357cd4ad731ecd10ad7f0b81ceb.apk
-
Size
4.2MB
-
MD5
40f97a94af5fc5bd5ded862a97878603
-
SHA1
d45dc7b8f0fe5c6e04cc4d1883bd3bf25ab54f63
-
SHA256
7b7d444527be2709a9068919ab59bf25e11ab357cd4ad731ecd10ad7f0b81ceb
-
SHA512
743a2b9fff5cd4d6bdce805057c554742345f71e191716f4cf6ffd020b34224c2ee932cd627a57ef8cee83f2a08c49ee0859316383c91a15db4240208594bae9
-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-