General
-
Target
a2d3292bb87f8d6b3ce4b45d9ae6d61b4b7398770f732b72c881f43b66a49461.apk
-
Size
4.4MB
-
Sample
211207-t8p8yabecj
-
MD5
e4b7d12eca4451af72379738e8d425f1
-
SHA1
db43b7bec37baa08461a5ec1efec59d14479e5d9
-
SHA256
a2d3292bb87f8d6b3ce4b45d9ae6d61b4b7398770f732b72c881f43b66a49461
-
SHA512
a38d59569da4181c970d897f1d6dd22f588d43ad0e6190193fc5fb034104a740ebed585c684647f5ff1472602335ecd0a08580395230c147f96ede0cefcd50c3
Static task
static1
Behavioral task
behavioral1
Sample
a2d3292bb87f8d6b3ce4b45d9ae6d61b4b7398770f732b72c881f43b66a49461.apk
Resource
android-x64-arm64
Malware Config
Targets
-
-
Target
a2d3292bb87f8d6b3ce4b45d9ae6d61b4b7398770f732b72c881f43b66a49461.apk
-
Size
4.4MB
-
MD5
e4b7d12eca4451af72379738e8d425f1
-
SHA1
db43b7bec37baa08461a5ec1efec59d14479e5d9
-
SHA256
a2d3292bb87f8d6b3ce4b45d9ae6d61b4b7398770f732b72c881f43b66a49461
-
SHA512
a38d59569da4181c970d897f1d6dd22f588d43ad0e6190193fc5fb034104a740ebed585c684647f5ff1472602335ecd0a08580395230c147f96ede0cefcd50c3
Score10/10-
FluBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-