General

  • Target

    6323ac65167e8d48c3bd6c8b839eb600b5b9be9b942e582640147be8d98cedb6.apk

  • Size

    2.6MB

  • Sample

    220616-w73hzsbbb8

  • MD5

    b65b16fb181011fdaf1fa4bcc22edf5b

  • SHA1

    93c3c66ede2d13c5ec2325ee0f774a6808c0d7af

  • SHA256

    6323ac65167e8d48c3bd6c8b839eb600b5b9be9b942e582640147be8d98cedb6

  • SHA512

    6ea8a8c5ca4875707ac338236f9f945787a793ee125a41f8a4423d3e5b6339ddd8bf59432f17da5c1c98026001f797d0520b51bc0d16bafe68d931b202a10d76

Malware Config

Targets

    • Target

      6323ac65167e8d48c3bd6c8b839eb600b5b9be9b942e582640147be8d98cedb6.apk

    • Size

      2.6MB

    • MD5

      b65b16fb181011fdaf1fa4bcc22edf5b

    • SHA1

      93c3c66ede2d13c5ec2325ee0f774a6808c0d7af

    • SHA256

      6323ac65167e8d48c3bd6c8b839eb600b5b9be9b942e582640147be8d98cedb6

    • SHA512

      6ea8a8c5ca4875707ac338236f9f945787a793ee125a41f8a4423d3e5b6339ddd8bf59432f17da5c1c98026001f797d0520b51bc0d16bafe68d931b202a10d76

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks