Resubmissions

26-04-2022 11:10

220426-m9z17scbg7 10

26-04-2022 11:08

220426-m8wx6acbg2 10

General

  • Target

    Voicemail.apk

  • Size

    5.8MB

  • Sample

    220426-m9z17scbg7

  • MD5

    60cb380846833a5cdfc47a97569af235

  • SHA1

    a6762bb66b6015308d9e0d0c2b04785cce353d7e

  • SHA256

    8f30f7c01116af14f9050220f10732634badcb8b57e91b7fa06c85cf1d92ef06

  • SHA512

    978808876eda2784657884fb61f1651820a9f6c61dbc7e951d5b34103e4776ba8e24d4d27413d7278ade9901e3c6c08fd77f87a1098a08beab982486ce2b9965

Malware Config

Targets

    • Target

      Voicemail.apk

    • Size

      5.8MB

    • MD5

      60cb380846833a5cdfc47a97569af235

    • SHA1

      a6762bb66b6015308d9e0d0c2b04785cce353d7e

    • SHA256

      8f30f7c01116af14f9050220f10732634badcb8b57e91b7fa06c85cf1d92ef06

    • SHA512

      978808876eda2784657884fb61f1651820a9f6c61dbc7e951d5b34103e4776ba8e24d4d27413d7278ade9901e3c6c08fd77f87a1098a08beab982486ce2b9965

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks