General

  • Target

    562b50e21fbaa4873f4f854a6fe68c4eb3238cdb0331ae767c4585be4c9713fd.apk

  • Size

    3.8MB

  • Sample

    210902-q1r6sadbak

  • MD5

    794a77ea0f9571ae74e565e4d66e2a73

  • SHA1

    68b32d1bb5530236ab356d3394e496ba16dad3a0

  • SHA256

    562b50e21fbaa4873f4f854a6fe68c4eb3238cdb0331ae767c4585be4c9713fd

  • SHA512

    700fb1c7d75763e223ea3428fbafe74f47977955dd462f6aaaed4ba83f475c54ecd35fce5daaf70b8a9ea8c03af74e2bccff6351a03e40d8100b75ab3252c7ce

Malware Config

Targets

    • Target

      562b50e21fbaa4873f4f854a6fe68c4eb3238cdb0331ae767c4585be4c9713fd.apk

    • Size

      3.8MB

    • MD5

      794a77ea0f9571ae74e565e4d66e2a73

    • SHA1

      68b32d1bb5530236ab356d3394e496ba16dad3a0

    • SHA256

      562b50e21fbaa4873f4f854a6fe68c4eb3238cdb0331ae767c4585be4c9713fd

    • SHA512

      700fb1c7d75763e223ea3428fbafe74f47977955dd462f6aaaed4ba83f475c54ecd35fce5daaf70b8a9ea8c03af74e2bccff6351a03e40d8100b75ab3252c7ce

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks