General

  • Target

    34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c.apk

  • Size

    2.6MB

  • Sample

    220616-w1zthsgefn

  • MD5

    6a7e746ade78143f4ca2a7a4ce33f250

  • SHA1

    452abfbc77dc37780b571d0ce4f623ac960d89ff

  • SHA256

    34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c

  • SHA512

    d4a82b20a5acf601e36b2c1abcdc1a6275a6baca43746e4a7f525368f1db5e699369efe1c0656172f962b44bb4c2f421bf526d0466e24f094af623e10d546245

Malware Config

Targets

    • Target

      34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c.apk

    • Size

      2.6MB

    • MD5

      6a7e746ade78143f4ca2a7a4ce33f250

    • SHA1

      452abfbc77dc37780b571d0ce4f623ac960d89ff

    • SHA256

      34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c

    • SHA512

      d4a82b20a5acf601e36b2c1abcdc1a6275a6baca43746e4a7f525368f1db5e699369efe1c0656172f962b44bb4c2f421bf526d0466e24f094af623e10d546245

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

      suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Enterprise v6

Tasks