General

  • Target

    ef6b1f59ddce3b99b5d05c1eeffe1435d1ffeaae7d644e4550d4887e673e0883.apk

  • Size

    3.4MB

  • Sample

    210827-greeqqng22

  • MD5

    8902eba1572d98a9f9468b68be1d9018

  • SHA1

    db811b2f7f4d367e1035570e20f93d4b3f6c6306

  • SHA256

    ef6b1f59ddce3b99b5d05c1eeffe1435d1ffeaae7d644e4550d4887e673e0883

  • SHA512

    137356afd46449c5896cfac10b5bd4c39b0d0e80244fa57f9a4dcfe30bd12846da5930d574a1fe398e8a148c2c1af7f591388ac79af8cf9c3e4fc629112e437f

Malware Config

Targets

    • Target

      ef6b1f59ddce3b99b5d05c1eeffe1435d1ffeaae7d644e4550d4887e673e0883.apk

    • Size

      3.4MB

    • MD5

      8902eba1572d98a9f9468b68be1d9018

    • SHA1

      db811b2f7f4d367e1035570e20f93d4b3f6c6306

    • SHA256

      ef6b1f59ddce3b99b5d05c1eeffe1435d1ffeaae7d644e4550d4887e673e0883

    • SHA512

      137356afd46449c5896cfac10b5bd4c39b0d0e80244fa57f9a4dcfe30bd12846da5930d574a1fe398e8a148c2c1af7f591388ac79af8cf9c3e4fc629112e437f

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks