1547e5669f2cbb2391c6f6790298eda5502dde28819985f131138a2d25fc0f89.apk

General
Target

1547e5669f2cbb2391c6f6790298eda5502dde28819985f131138a2d25fc0f89.apk

Size

4MB

Sample

211021-j55t4saac7

Score
10 /10
MD5

45767dc1a56de15fcb761395114b18b7

SHA1

e7d930b1c824ecbade93df44f6139d6e2334427b

SHA256

1547e5669f2cbb2391c6f6790298eda5502dde28819985f131138a2d25fc0f89

SHA512

7e2bd248bb48548f4cbb2edb8b286cdfd6532438d196c054d901b1e1bed9e4ffbe5c39f9e81db8b54fc3a1e6e695462ad1b68887c8829f3bf0beee7d7644beeb

Malware Config
Targets
Target

1547e5669f2cbb2391c6f6790298eda5502dde28819985f131138a2d25fc0f89.apk

MD5

45767dc1a56de15fcb761395114b18b7

Filesize

4MB

Score
10 /10
SHA1

e7d930b1c824ecbade93df44f6139d6e2334427b

SHA256

1547e5669f2cbb2391c6f6790298eda5502dde28819985f131138a2d25fc0f89

SHA512

7e2bd248bb48548f4cbb2edb8b286cdfd6532438d196c054d901b1e1bed9e4ffbe5c39f9e81db8b54fc3a1e6e695462ad1b68887c8829f3bf0beee7d7644beeb

Tags

Signatures

  • FluBot

    Description

    FluBot is an android banking trojan that uses overlays.

    Tags

  • FluBot Payload

  • Loads dropped Dex/Jar

    Description

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

  • Uses Crypto APIs (Might try to encrypt user data).

    Tags

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks

                          static1

                          7/10