General

  • Target

    1547e5669f2cbb2391c6f6790298eda5502dde28819985f131138a2d25fc0f89.apk

  • Size

    4.1MB

  • Sample

    211021-j55t4saac7

  • MD5

    45767dc1a56de15fcb761395114b18b7

  • SHA1

    e7d930b1c824ecbade93df44f6139d6e2334427b

  • SHA256

    1547e5669f2cbb2391c6f6790298eda5502dde28819985f131138a2d25fc0f89

  • SHA512

    7e2bd248bb48548f4cbb2edb8b286cdfd6532438d196c054d901b1e1bed9e4ffbe5c39f9e81db8b54fc3a1e6e695462ad1b68887c8829f3bf0beee7d7644beeb

Malware Config

Targets

    • Target

      1547e5669f2cbb2391c6f6790298eda5502dde28819985f131138a2d25fc0f89.apk

    • Size

      4.1MB

    • MD5

      45767dc1a56de15fcb761395114b18b7

    • SHA1

      e7d930b1c824ecbade93df44f6139d6e2334427b

    • SHA256

      1547e5669f2cbb2391c6f6790298eda5502dde28819985f131138a2d25fc0f89

    • SHA512

      7e2bd248bb48548f4cbb2edb8b286cdfd6532438d196c054d901b1e1bed9e4ffbe5c39f9e81db8b54fc3a1e6e695462ad1b68887c8829f3bf0beee7d7644beeb

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks