General

  • Target

    41d7af5f935d567d36ef594f30301057649ddec79ca2ccc82a21159104983c4c.apk

  • Size

    3.0MB

  • Sample

    210920-pk5w9sggbn

  • MD5

    ae4f6beecfed2b449e44b2e52fbd3baf

  • SHA1

    56617977cec8cd6885e9464290ab38d239445ac9

  • SHA256

    41d7af5f935d567d36ef594f30301057649ddec79ca2ccc82a21159104983c4c

  • SHA512

    711710009c0d27fca834ff0c3464c264114c82173c9dd559f2490d95af0a62db429970a9e0c5b2bdd5213cfed55993e06789c6b320734e76151d8a97b47431a7

Malware Config

Targets

    • Target

      41d7af5f935d567d36ef594f30301057649ddec79ca2ccc82a21159104983c4c.apk

    • Size

      3.0MB

    • MD5

      ae4f6beecfed2b449e44b2e52fbd3baf

    • SHA1

      56617977cec8cd6885e9464290ab38d239445ac9

    • SHA256

      41d7af5f935d567d36ef594f30301057649ddec79ca2ccc82a21159104983c4c

    • SHA512

      711710009c0d27fca834ff0c3464c264114c82173c9dd559f2490d95af0a62db429970a9e0c5b2bdd5213cfed55993e06789c6b320734e76151d8a97b47431a7

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks