General
-
Target
65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198a
-
Size
3.0MB
-
Sample
220616-w3qcvsgegl
-
MD5
8911032f30ee0ecc589bcabfb72c0573
-
SHA1
72802bd568b2118a7de463a451cb13e20bbd88e7
-
SHA256
65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198
-
SHA512
885159589c864b92674ddba1d12516d2b7315d757c79d87bb9179b9ef28eab2a074ac921b866846902ae566250eb55ffebfc55a50af9237ad31b3c55e09c3f59
Static task
static1
Behavioral task
behavioral1
Sample
65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198a.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198a.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198a.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198a
-
Size
3.0MB
-
MD5
8911032f30ee0ecc589bcabfb72c0573
-
SHA1
72802bd568b2118a7de463a451cb13e20bbd88e7
-
SHA256
65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198
-
SHA512
885159589c864b92674ddba1d12516d2b7315d757c79d87bb9179b9ef28eab2a074ac921b866846902ae566250eb55ffebfc55a50af9237ad31b3c55e09c3f59
-
FluBot Payload
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-