General

  • Target

    352e9dabede5a893b1a7af33bd23fb57e84b7606ee0ccdff1fb08657dd52db0e.apk

  • Size

    4.0MB

  • Sample

    220616-w5wyesgfak

  • MD5

    0f1ed21fff27291645ee8350bc813228

  • SHA1

    ba73b04ef692e1ce947aaacf4dd82955261c275c

  • SHA256

    352e9dabede5a893b1a7af33bd23fb57e84b7606ee0ccdff1fb08657dd52db0e

  • SHA512

    196050ff2d5fc4c95308894225ee273f1c1e4635e42f6ea88443d78d9889741e566b587e6a175dd5d4d94439f9bd29c65f1e50c276fe6b63a4f801e35295071f

Malware Config

Targets

    • Target

      352e9dabede5a893b1a7af33bd23fb57e84b7606ee0ccdff1fb08657dd52db0e.apk

    • Size

      4.0MB

    • MD5

      0f1ed21fff27291645ee8350bc813228

    • SHA1

      ba73b04ef692e1ce947aaacf4dd82955261c275c

    • SHA256

      352e9dabede5a893b1a7af33bd23fb57e84b7606ee0ccdff1fb08657dd52db0e

    • SHA512

      196050ff2d5fc4c95308894225ee273f1c1e4635e42f6ea88443d78d9889741e566b587e6a175dd5d4d94439f9bd29c65f1e50c276fe6b63a4f801e35295071f

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks