General

  • Target

    a0181864eed9294cac0d278fa0eadabe68b3adb333eeb2e26cc082836f82489d.apk

  • Size

    3.8MB

  • Sample

    220616-w5f7zagehn

  • MD5

    c23426edaf37a2fc6fc3a6e5daa17bfa

  • SHA1

    a362e1aaf8bc7a7491b10eab252c3b7ee8532a46

  • SHA256

    a0181864eed9294cac0d278fa0eadabe68b3adb333eeb2e26cc082836f82489d

  • SHA512

    98b78e62a63d87ddc55722658e85acb5f9ba4b792578ca8868e8214e04f4336e9728bec2c386b6afbac4f2183f8232d6e958b215c5c0948746f4254d32ffa2ff

Malware Config

Targets

    • Target

      a0181864eed9294cac0d278fa0eadabe68b3adb333eeb2e26cc082836f82489d.apk

    • Size

      3.8MB

    • MD5

      c23426edaf37a2fc6fc3a6e5daa17bfa

    • SHA1

      a362e1aaf8bc7a7491b10eab252c3b7ee8532a46

    • SHA256

      a0181864eed9294cac0d278fa0eadabe68b3adb333eeb2e26cc082836f82489d

    • SHA512

      98b78e62a63d87ddc55722658e85acb5f9ba4b792578ca8868e8214e04f4336e9728bec2c386b6afbac4f2183f8232d6e958b215c5c0948746f4254d32ffa2ff

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks