General
-
Target
093a65f30e9340b2a0e27228fe678426295ff97b934024eda5b8d080a8987d3e.apk
-
Size
4.0MB
-
Sample
220616-w2vk7agefq
-
MD5
4807de51d4e79f4f00c72bbe8fda93c2
-
SHA1
4127a83ca90d142234e00d5b931a43506e190102
-
SHA256
093a65f30e9340b2a0e27228fe678426295ff97b934024eda5b8d080a8987d3e
-
SHA512
17b05948361d5aa8233b97c18e36ccfb58bf97986aa118016bc0de3262fdedce0e2543ca40a72ff9832659abc33cd61cfb447d34610bc7a1dc0c89d138b90fb9
Static task
static1
Behavioral task
behavioral1
Sample
093a65f30e9340b2a0e27228fe678426295ff97b934024eda5b8d080a8987d3e.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
093a65f30e9340b2a0e27228fe678426295ff97b934024eda5b8d080a8987d3e.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
093a65f30e9340b2a0e27228fe678426295ff97b934024eda5b8d080a8987d3e.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
093a65f30e9340b2a0e27228fe678426295ff97b934024eda5b8d080a8987d3e.apk
-
Size
4.0MB
-
MD5
4807de51d4e79f4f00c72bbe8fda93c2
-
SHA1
4127a83ca90d142234e00d5b931a43506e190102
-
SHA256
093a65f30e9340b2a0e27228fe678426295ff97b934024eda5b8d080a8987d3e
-
SHA512
17b05948361d5aa8233b97c18e36ccfb58bf97986aa118016bc0de3262fdedce0e2543ca40a72ff9832659abc33cd61cfb447d34610bc7a1dc0c89d138b90fb9
Score10/10-
FluBot Payload
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses
suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-