General

  • Target

    30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8

  • Size

    5.5MB

  • Sample

    220616-w6rp4agfan

  • MD5

    2600311823e0c228f0231650689bc751

  • SHA1

    8cb68c08014f70d84f63acd0c8829a977d538a6b

  • SHA256

    30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8

  • SHA512

    3f0b8713613c94a40e61cef6eeb782ebb8455d12a889c46051d89ddeab68c5b2fb17c50543dd782b0f23f7887a496f6dc2a23063ce879197f5460b72e6903eff

Malware Config

Targets

    • Target

      30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8

    • Size

      5.5MB

    • MD5

      2600311823e0c228f0231650689bc751

    • SHA1

      8cb68c08014f70d84f63acd0c8829a977d538a6b

    • SHA256

      30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8

    • SHA512

      3f0b8713613c94a40e61cef6eeb782ebb8455d12a889c46051d89ddeab68c5b2fb17c50543dd782b0f23f7887a496f6dc2a23063ce879197f5460b72e6903eff

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks