General

  • Target

    6a03efa4ffa38032edfb5b604672e8c9e01a324f8857b5848e8160593dfb325e.apk

  • Size

    4.0MB

  • Sample

    220616-t46p5aafc3

  • MD5

    1edd97885a8a7e88694be9971ac317e5

  • SHA1

    64c4b39176709a7fa9be936b925b17fb53544da9

  • SHA256

    6a03efa4ffa38032edfb5b604672e8c9e01a324f8857b5848e8160593dfb325e

  • SHA512

    2aa25bae46e2c3f1ebdd2360c378f711ebc40fe82f9541d6a52d48f3ee14f46801a7125d6b02afdeaa342dfd96b6b22017cf7011e81fad749ce864b1703a077a

Malware Config

Targets

    • Target

      6a03efa4ffa38032edfb5b604672e8c9e01a324f8857b5848e8160593dfb325e.apk

    • Size

      4.0MB

    • MD5

      1edd97885a8a7e88694be9971ac317e5

    • SHA1

      64c4b39176709a7fa9be936b925b17fb53544da9

    • SHA256

      6a03efa4ffa38032edfb5b604672e8c9e01a324f8857b5848e8160593dfb325e

    • SHA512

      2aa25bae46e2c3f1ebdd2360c378f711ebc40fe82f9541d6a52d48f3ee14f46801a7125d6b02afdeaa342dfd96b6b22017cf7011e81fad749ce864b1703a077a

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

      suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Enterprise v6

Tasks