General

  • Target

    3f92de4c765321d0d022a607266351cea4de1929a5eceae07b3d76b5d606716c.apk

  • Size

    4.0MB

  • Sample

    220616-w4k5jagegq

  • MD5

    155953e69a4512cd222fd13863228a1f

  • SHA1

    2c1d549a0691b45ba219508742af51105fb5a2ee

  • SHA256

    3f92de4c765321d0d022a607266351cea4de1929a5eceae07b3d76b5d606716c

  • SHA512

    27ad53a4296731e4eb29f7e6e74ddb400b2d5f1742581930aef8ec7bfd898ba54df6c9afdff026700bda9fb0e202b25988eb28a715c2e573e30c784f3c4bd1b4

Malware Config

Targets

    • Target

      3f92de4c765321d0d022a607266351cea4de1929a5eceae07b3d76b5d606716c.apk

    • Size

      4.0MB

    • MD5

      155953e69a4512cd222fd13863228a1f

    • SHA1

      2c1d549a0691b45ba219508742af51105fb5a2ee

    • SHA256

      3f92de4c765321d0d022a607266351cea4de1929a5eceae07b3d76b5d606716c

    • SHA512

      27ad53a4296731e4eb29f7e6e74ddb400b2d5f1742581930aef8ec7bfd898ba54df6c9afdff026700bda9fb0e202b25988eb28a715c2e573e30c784f3c4bd1b4

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks