General

  • Target

    831334e1e49ec7a25375562688543ee75b2b3cc7352afc019856342def52476b.apk

  • Size

    4.8MB

  • Sample

    220615-qmskdsbcb8

  • MD5

    c10d38a63e776e5940d281bddbb497d4

  • SHA1

    ac0561ee9acc38c138409d03a24bdd992a5b1d96

  • SHA256

    831334e1e49ec7a25375562688543ee75b2b3cc7352afc019856342def52476b

  • SHA512

    a9ddd9f1f370c0a15fc4f777ccd1bad8e2c3c6ad1236561fe8dc8e44690498e095fe86b755af68d43c14dc9a85cd0f9bbda452463e7dcad1e4bcdb2901ce3da5

Malware Config

Targets

    • Target

      831334e1e49ec7a25375562688543ee75b2b3cc7352afc019856342def52476b.apk

    • Size

      4.8MB

    • MD5

      c10d38a63e776e5940d281bddbb497d4

    • SHA1

      ac0561ee9acc38c138409d03a24bdd992a5b1d96

    • SHA256

      831334e1e49ec7a25375562688543ee75b2b3cc7352afc019856342def52476b

    • SHA512

      a9ddd9f1f370c0a15fc4f777ccd1bad8e2c3c6ad1236561fe8dc8e44690498e095fe86b755af68d43c14dc9a85cd0f9bbda452463e7dcad1e4bcdb2901ce3da5

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Enterprise v6

Tasks