General

  • Target

    eabe4a.apk

  • Size

    4.8MB

  • Sample

    220224-wvldyaddh3

  • MD5

    3c27c60e3677c0f86760a765701eaf82

  • SHA1

    f67a47fb399acf2a4efabf551687023d09481f4d

  • SHA256

    eabe4aef231ac85bbbd2e085d7cbe993d1aa66eddd75289c829a4d17ed2b500a

  • SHA512

    c5d751c829f3840db12ad5b5f7153882cc7cc8b5af677e40ea7326d8c65d7d247fa639775a55fc2feeca7de1c6d460df0424b2ea4bb18b7230288949c4044108

Malware Config

Targets

    • Target

      eabe4a.apk

    • Size

      4.8MB

    • MD5

      3c27c60e3677c0f86760a765701eaf82

    • SHA1

      f67a47fb399acf2a4efabf551687023d09481f4d

    • SHA256

      eabe4aef231ac85bbbd2e085d7cbe993d1aa66eddd75289c829a4d17ed2b500a

    • SHA512

      c5d751c829f3840db12ad5b5f7153882cc7cc8b5af677e40ea7326d8c65d7d247fa639775a55fc2feeca7de1c6d460df0424b2ea4bb18b7230288949c4044108

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks