General

  • Target

    b2dafc4faea81f4addf1ac3a295627e9f7e1d36efa2a8b82a813d853cfcf87c4.apk

  • Size

    5.6MB

  • Sample

    220214-t64csaacf7

  • MD5

    1a62b069940c7d64a4b5d5326cf36bf2

  • SHA1

    80926e3c3edbabcd765ae5fa3b81a08367d86057

  • SHA256

    b2dafc4faea81f4addf1ac3a295627e9f7e1d36efa2a8b82a813d853cfcf87c4

  • SHA512

    6db9e15426a04bdce1acd1197bab4c600a2d8d8144d3cf107e92b0d3b5ead83eb29b8fcd9d34b1144b916b09a6709449ba774ee3f6a977875dd8c503a73f51ac

Malware Config

Targets

    • Target

      b2dafc4faea81f4addf1ac3a295627e9f7e1d36efa2a8b82a813d853cfcf87c4.apk

    • Size

      5.6MB

    • MD5

      1a62b069940c7d64a4b5d5326cf36bf2

    • SHA1

      80926e3c3edbabcd765ae5fa3b81a08367d86057

    • SHA256

      b2dafc4faea81f4addf1ac3a295627e9f7e1d36efa2a8b82a813d853cfcf87c4

    • SHA512

      6db9e15426a04bdce1acd1197bab4c600a2d8d8144d3cf107e92b0d3b5ead83eb29b8fcd9d34b1144b916b09a6709449ba774ee3f6a977875dd8c503a73f51ac

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Makes use of the framework's Accessibility service.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks