General

  • Target

    22b0545.apk

  • Size

    4.4MB

  • Sample

    220316-ygjpaseaek

  • MD5

    59f204776aeca11f4e2f29535edd82e4

  • SHA1

    f99b1f9ebedc086cfe1e446d446ed830264d457b

  • SHA256

    22b054513b595301a4e7ba3e6c879b11e198ca8392e572d70514b0a0336e43b5

  • SHA512

    9d3c39897bb6b87b72fecc7f47f78df03fad4e50b8b976f0f0e591949295c0adb789ad45d023a55312b512e276dd38a8588b3a8ab1410579da521ea0ddd07806

Malware Config

Targets

    • Target

      22b0545.apk

    • Size

      4.4MB

    • MD5

      59f204776aeca11f4e2f29535edd82e4

    • SHA1

      f99b1f9ebedc086cfe1e446d446ed830264d457b

    • SHA256

      22b054513b595301a4e7ba3e6c879b11e198ca8392e572d70514b0a0336e43b5

    • SHA512

      9d3c39897bb6b87b72fecc7f47f78df03fad4e50b8b976f0f0e591949295c0adb789ad45d023a55312b512e276dd38a8588b3a8ab1410579da521ea0ddd07806

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks