General

  • Target

    ea6776fac45c8844242fdb566a17e70569813298235567bbe9fa0dd062f1160b.apk

  • Size

    4.6MB

  • Sample

    220616-w9dbwagfcl

  • MD5

    891d5d2c397e9ad5fed5685f78657d4b

  • SHA1

    f2f3f6344e054a03cd83e2e2f00af2af3d59f1c5

  • SHA256

    ea6776fac45c8844242fdb566a17e70569813298235567bbe9fa0dd062f1160b

  • SHA512

    369875e4359b91936f015d347be0f765ffdfddb92c82d887d3cbe07c38dacc0029b25f38682f270700feaa62d728ccf42ccd95362785f7c2119ae43e74d2ac49

Malware Config

Targets

    • Target

      ea6776fac45c8844242fdb566a17e70569813298235567bbe9fa0dd062f1160b.apk

    • Size

      4.6MB

    • MD5

      891d5d2c397e9ad5fed5685f78657d4b

    • SHA1

      f2f3f6344e054a03cd83e2e2f00af2af3d59f1c5

    • SHA256

      ea6776fac45c8844242fdb566a17e70569813298235567bbe9fa0dd062f1160b

    • SHA512

      369875e4359b91936f015d347be0f765ffdfddb92c82d887d3cbe07c38dacc0029b25f38682f270700feaa62d728ccf42ccd95362785f7c2119ae43e74d2ac49

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Enterprise v6

Tasks