General

  • Target

    093a65f30e9340b2a0e27228fe678426295ff97b934024eda5b8d080a8987d3e.apk

  • Size

    4.0MB

  • Sample

    220616-w2vk7agefq

  • MD5

    4807de51d4e79f4f00c72bbe8fda93c2

  • SHA1

    4127a83ca90d142234e00d5b931a43506e190102

  • SHA256

    093a65f30e9340b2a0e27228fe678426295ff97b934024eda5b8d080a8987d3e

  • SHA512

    17b05948361d5aa8233b97c18e36ccfb58bf97986aa118016bc0de3262fdedce0e2543ca40a72ff9832659abc33cd61cfb447d34610bc7a1dc0c89d138b90fb9

Malware Config

Targets

    • Target

      093a65f30e9340b2a0e27228fe678426295ff97b934024eda5b8d080a8987d3e.apk

    • Size

      4.0MB

    • MD5

      4807de51d4e79f4f00c72bbe8fda93c2

    • SHA1

      4127a83ca90d142234e00d5b931a43506e190102

    • SHA256

      093a65f30e9340b2a0e27228fe678426295ff97b934024eda5b8d080a8987d3e

    • SHA512

      17b05948361d5aa8233b97c18e36ccfb58bf97986aa118016bc0de3262fdedce0e2543ca40a72ff9832659abc33cd61cfb447d34610bc7a1dc0c89d138b90fb9

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

      suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks