General

  • Target

    1b0bfad146eeb4295c3a1ee5b316adea4b1195bf35006b038d8d6d21d8310e5b.apk

  • Size

    4.1MB

  • Sample

    210915-hk6p8sdafm

  • MD5

    39219f88afa326f1045a35e3088c2706

  • SHA1

    aba6c3dc0c507f5329846e668e805d4660af7fce

  • SHA256

    1b0bfad146eeb4295c3a1ee5b316adea4b1195bf35006b038d8d6d21d8310e5b

  • SHA512

    82d4c664bf9d16995839f7a1eafde282632f87d436592de74a99a63c44409a1d727abbd552d6e7c518842c600bbeeed338383c066347ea532631494a96b86664

Malware Config

Targets

    • Target

      1b0bfad146eeb4295c3a1ee5b316adea4b1195bf35006b038d8d6d21d8310e5b.apk

    • Size

      4.1MB

    • MD5

      39219f88afa326f1045a35e3088c2706

    • SHA1

      aba6c3dc0c507f5329846e668e805d4660af7fce

    • SHA256

      1b0bfad146eeb4295c3a1ee5b316adea4b1195bf35006b038d8d6d21d8310e5b

    • SHA512

      82d4c664bf9d16995839f7a1eafde282632f87d436592de74a99a63c44409a1d727abbd552d6e7c518842c600bbeeed338383c066347ea532631494a96b86664

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks