General

  • Target

    34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c.zip

  • Size

    2.5MB

  • Sample

    210915-xecbrsbbd7

  • MD5

    4b63a8a715bfdbaf61f200f7da22fe71

  • SHA1

    82f0c0afeaba06ea13f27b889064d9202c24bf67

  • SHA256

    665164cdc3f7c49f4bb8a6ba297014184523f742b2ad844db47b5354c78f1897

  • SHA512

    006ef0ed5e2444dc8c322b503e44e9a340e681f99cada4358afcfa6262ded69fb36c745191b1480c54f8db1d618e12f00c12853226c9f1c1aa63193a6b4e3270

Malware Config

Targets

    • Target

      34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c.apk

    • Size

      2.6MB

    • MD5

      6a7e746ade78143f4ca2a7a4ce33f250

    • SHA1

      452abfbc77dc37780b571d0ce4f623ac960d89ff

    • SHA256

      34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c

    • SHA512

      d4a82b20a5acf601e36b2c1abcdc1a6275a6baca43746e4a7f525368f1db5e699369efe1c0656172f962b44bb4c2f421bf526d0466e24f094af623e10d546245

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks