General

  • Target

    e6fa66fc4795131cfbb97668279b84fbf389cc0ff736ae77ec351caa15a45038.apk

  • Size

    4.1MB

  • Sample

    211014-nbyadsghh5

  • MD5

    532cfe30d666611e34eb49ae310c81cf

  • SHA1

    4e446a48e0a4097371442a2cf88a202226828d10

  • SHA256

    e6fa66fc4795131cfbb97668279b84fbf389cc0ff736ae77ec351caa15a45038

  • SHA512

    dd991e6e4accde9f70e5da9f8c2bab220905ec4083f0ae81e9c7a02b1b3cc9f9f571d95a89774539ef9e0795bb8399ae028e56766d155251938b8d6becb27589

Malware Config

Targets

    • Target

      e6fa66fc4795131cfbb97668279b84fbf389cc0ff736ae77ec351caa15a45038.apk

    • Size

      4.1MB

    • MD5

      532cfe30d666611e34eb49ae310c81cf

    • SHA1

      4e446a48e0a4097371442a2cf88a202226828d10

    • SHA256

      e6fa66fc4795131cfbb97668279b84fbf389cc0ff736ae77ec351caa15a45038

    • SHA512

      dd991e6e4accde9f70e5da9f8c2bab220905ec4083f0ae81e9c7a02b1b3cc9f9f571d95a89774539ef9e0795bb8399ae028e56766d155251938b8d6becb27589

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks