General

  • Target

    e726fba32877ada9b664df81a0b6c6b8376bd2d4bfebc61fd641c2da6ca0f663.apk

  • Size

    3.4MB

  • Sample

    210810-xwwhxsdmax

  • MD5

    85cc139faa689022754ce1aab367f978

  • SHA1

    ffd970461e4e6ba1b36454c02e0639a382203a70

  • SHA256

    e726fba32877ada9b664df81a0b6c6b8376bd2d4bfebc61fd641c2da6ca0f663

  • SHA512

    e264da1e36060270f0d8f141112c82e831c9d51bd32732b4d1e75201ecc857bc35179b4b0253ea299cd613610f07f8aaf77634200c5e79eb3d330861ae844c61

Malware Config

Targets

    • Target

      e726fba32877ada9b664df81a0b6c6b8376bd2d4bfebc61fd641c2da6ca0f663.apk

    • Size

      3.4MB

    • MD5

      85cc139faa689022754ce1aab367f978

    • SHA1

      ffd970461e4e6ba1b36454c02e0639a382203a70

    • SHA256

      e726fba32877ada9b664df81a0b6c6b8376bd2d4bfebc61fd641c2da6ca0f663

    • SHA512

      e264da1e36060270f0d8f141112c82e831c9d51bd32732b4d1e75201ecc857bc35179b4b0253ea299cd613610f07f8aaf77634200c5e79eb3d330861ae844c61

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks