General
-
Target
Voicemail.apk
-
Size
4.5MB
-
Sample
220413-lq3sbaahdj
-
MD5
3792143bdc6821a17b4a7691159e0d79
-
SHA1
5f4afa4783c7bbf79dedd0a9b5bc44087b631fb7
-
SHA256
a952704d730558072d8050e868640130e170f02f179eb39ea20696b6cd0ad0c5
-
SHA512
9726db642251f85712ee9f822cfeffa23a81bc50e8cf0b60edebd9c86003e7a4c2b3733c8bd2ab836fcf46c9002e59ab4b2cb8295fe4a497c8a7c58985b68cbd
Static task
static1
Behavioral task
behavioral1
Sample
Voicemail.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
Voicemail.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
Voicemail.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
Voicemail.apk
-
Size
4.5MB
-
MD5
3792143bdc6821a17b4a7691159e0d79
-
SHA1
5f4afa4783c7bbf79dedd0a9b5bc44087b631fb7
-
SHA256
a952704d730558072d8050e868640130e170f02f179eb39ea20696b6cd0ad0c5
-
SHA512
9726db642251f85712ee9f822cfeffa23a81bc50e8cf0b60edebd9c86003e7a4c2b3733c8bd2ab836fcf46c9002e59ab4b2cb8295fe4a497c8a7c58985b68cbd
Score10/10-
FluBot Payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-