General

  • Target

    7d1f76505d1de5253429f5228b8decb0c75ab0f76915a8d560086f88c9d2a1b9.apk

  • Size

    3.0MB

  • Sample

    210920-pk5aqseba3

  • MD5

    8f71586baa118dc1b472f179312011cb

  • SHA1

    7ac4a5afee451967b23c7740892b1c15d2ec8fc2

  • SHA256

    7d1f76505d1de5253429f5228b8decb0c75ab0f76915a8d560086f88c9d2a1b9

  • SHA512

    532c405df59e2db416958ad3e525fadb0658f9d6b447685320c0ad57eb1ef6db6068dafb03d921c40c672d6900d648434245e2064ee267aedffdb758ac34feeb

Malware Config

Targets

    • Target

      7d1f76505d1de5253429f5228b8decb0c75ab0f76915a8d560086f88c9d2a1b9.apk

    • Size

      3.0MB

    • MD5

      8f71586baa118dc1b472f179312011cb

    • SHA1

      7ac4a5afee451967b23c7740892b1c15d2ec8fc2

    • SHA256

      7d1f76505d1de5253429f5228b8decb0c75ab0f76915a8d560086f88c9d2a1b9

    • SHA512

      532c405df59e2db416958ad3e525fadb0658f9d6b447685320c0ad57eb1ef6db6068dafb03d921c40c672d6900d648434245e2064ee267aedffdb758ac34feeb

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks