Analysis
-
max time kernel
1804336s -
max time network
162s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
16-06-2022 08:02
Static task
static1
Behavioral task
behavioral1
Sample
Flubot_1.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
Flubot_1.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
Flubot_1.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
Flubot_1.apk
-
Size
5.0MB
-
MD5
5e3fb4a6f144335016f5d0773b0113fd
-
SHA1
1a555e9e7f65ebe7ab2c6a48e126c63bb38e7612
-
SHA256
36158735c5442bb6a2f5432226403905551f360d7ce99fa51e9d2b54b7cd02e7
-
SHA512
cd0aeedac720253a5ef1afbdfdaed7c7db9efa13c3423c329a83917746ca9cdc968ab4c01f2ee07dac6093a497d6224c0849348ade75d51b635411bf280ad340
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot Payload 1 IoCs
resource yara_rule behavioral2/memory/6313-0.dex family_flubot -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.snda.wifilocating/cJyl9g9uhh/udnb5JfccJukvhh/base.apk.ki5fhf91.hre 6313 com.snda.wifilocating -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.snda.wifilocating
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD53231abf45dda8eabf4554dfca61af489
SHA102c74432bcc3b377578ccd9906a67bdf42f31bc1
SHA2560e8e17046fed1d67c50ab29ed8588f19747b466158b57816fde1a88cfcddd5ef
SHA512630427645277d5dfb700daa8cf7b38af0b0b34c5c13b011d41602be803e999f5ba29b58053d6083f2e583d9555f6a9e1808158cc207edfb38ed7ad8d2bddbc13