Analysis

  • max time kernel
    2088717s
  • max time network
    161s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    21-01-2022 11:54

General

  • Target

    e897d931de7b19112b0ebd27d6b78801a15f9b054f11e56917fc8e7407fbf8f4.apk

  • Size

    6.3MB

  • MD5

    4bbc77bc6903f1b8292eaa768f411685

  • SHA1

    8e0da0d227626c40a2005535eb89e1ca314282fe

  • SHA256

    e897d931de7b19112b0ebd27d6b78801a15f9b054f11e56917fc8e7407fbf8f4

  • SHA512

    978a016ed18e52b3bd640285296ba2ccf7efc6dc63287a0359f07d5bfacf2da9f30b974504df86a70604b800a2306b98dedad2e2e33a006c9757e6e7e874f511

Malware Config

Signatures

  • FluBot

    FluBot is an android banking trojan that uses overlays.

  • FluBot Payload 1 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.snda.wifilocating
    1⤵
    • Loads dropped Dex/Jar
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:3804

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads