General

  • Target

    3aa8a961da73f4f9ee924e67b8f6ef8535f4ed6c2cf935ac7a46ced5c31fe20d.apk

  • Size

    3.3MB

  • Sample

    210920-pk4dfaeba2

  • MD5

    ba2b29449b51fbbe1139893d1a3f327b

  • SHA1

    1ce8d51606f1d0ce5f98e912ab8fccc864f25068

  • SHA256

    3aa8a961da73f4f9ee924e67b8f6ef8535f4ed6c2cf935ac7a46ced5c31fe20d

  • SHA512

    0529e1d968598c61663497e9eec54a25a6e9a6d85cc79927294f89df2db2487d0e7e328aaaeb8902bad318dcb4e138a71a3aaf71bda53baa71fdfafd9d8e89cb

Malware Config

Targets

    • Target

      3aa8a961da73f4f9ee924e67b8f6ef8535f4ed6c2cf935ac7a46ced5c31fe20d.apk

    • Size

      3.3MB

    • MD5

      ba2b29449b51fbbe1139893d1a3f327b

    • SHA1

      1ce8d51606f1d0ce5f98e912ab8fccc864f25068

    • SHA256

      3aa8a961da73f4f9ee924e67b8f6ef8535f4ed6c2cf935ac7a46ced5c31fe20d

    • SHA512

      0529e1d968598c61663497e9eec54a25a6e9a6d85cc79927294f89df2db2487d0e7e328aaaeb8902bad318dcb4e138a71a3aaf71bda53baa71fdfafd9d8e89cb

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks