General
-
Target
34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c.apk
-
Size
2.6MB
-
Sample
220616-w1zthsgefn
-
MD5
6a7e746ade78143f4ca2a7a4ce33f250
-
SHA1
452abfbc77dc37780b571d0ce4f623ac960d89ff
-
SHA256
34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c
-
SHA512
d4a82b20a5acf601e36b2c1abcdc1a6275a6baca43746e4a7f525368f1db5e699369efe1c0656172f962b44bb4c2f421bf526d0466e24f094af623e10d546245
Static task
static1
Behavioral task
behavioral1
Sample
34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c.apk
-
Size
2.6MB
-
MD5
6a7e746ade78143f4ca2a7a4ce33f250
-
SHA1
452abfbc77dc37780b571d0ce4f623ac960d89ff
-
SHA256
34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c
-
SHA512
d4a82b20a5acf601e36b2c1abcdc1a6275a6baca43746e4a7f525368f1db5e699369efe1c0656172f962b44bb4c2f421bf526d0466e24f094af623e10d546245
-
FluBot Payload
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses
suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Uses Crypto APIs (Might try to encrypt user data).
-