General
-
Target
1547e5669f2cbb2391c6f6790298eda5502dde28819985f131138a2d25fc0f89.apk
-
Size
4.1MB
-
Sample
211021-j55t4saac7
-
MD5
45767dc1a56de15fcb761395114b18b7
-
SHA1
e7d930b1c824ecbade93df44f6139d6e2334427b
-
SHA256
1547e5669f2cbb2391c6f6790298eda5502dde28819985f131138a2d25fc0f89
-
SHA512
7e2bd248bb48548f4cbb2edb8b286cdfd6532438d196c054d901b1e1bed9e4ffbe5c39f9e81db8b54fc3a1e6e695462ad1b68887c8829f3bf0beee7d7644beeb
Static task
static1
Behavioral task
behavioral1
Sample
1547e5669f2cbb2391c6f6790298eda5502dde28819985f131138a2d25fc0f89.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
1547e5669f2cbb2391c6f6790298eda5502dde28819985f131138a2d25fc0f89.apk
-
Size
4.1MB
-
MD5
45767dc1a56de15fcb761395114b18b7
-
SHA1
e7d930b1c824ecbade93df44f6139d6e2334427b
-
SHA256
1547e5669f2cbb2391c6f6790298eda5502dde28819985f131138a2d25fc0f89
-
SHA512
7e2bd248bb48548f4cbb2edb8b286cdfd6532438d196c054d901b1e1bed9e4ffbe5c39f9e81db8b54fc3a1e6e695462ad1b68887c8829f3bf0beee7d7644beeb
Score10/10-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-