General
-
Target
Flubot49.apk
-
Size
4.3MB
-
Sample
220616-wqe2csgdhk
-
MD5
9ef4f52a6ed459eab6311a4a886ec1ea
-
SHA1
6380e022ba149c072015389ab634a413f6662530
-
SHA256
6e3499a5e63209b34ccc787a7ea57953ff5436b51ca4325ea0da4a958f44ea7b
-
SHA512
34d9e5e63072eab73ea4a1b718d13de94ab277c091c4fa0029ff8f7bb6ea764bfb5520ebede1490ee279e2f823b4b52d10d6a604c0a61cd6ff3e1c8c70cbca98
Static task
static1
Behavioral task
behavioral1
Sample
Flubot49.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
Flubot49.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
Flubot49.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
Flubot49.apk
-
Size
4.3MB
-
MD5
9ef4f52a6ed459eab6311a4a886ec1ea
-
SHA1
6380e022ba149c072015389ab634a413f6662530
-
SHA256
6e3499a5e63209b34ccc787a7ea57953ff5436b51ca4325ea0da4a958f44ea7b
-
SHA512
34d9e5e63072eab73ea4a1b718d13de94ab277c091c4fa0029ff8f7bb6ea764bfb5520ebede1490ee279e2f823b4b52d10d6a604c0a61cd6ff3e1c8c70cbca98
-
FluBot Payload
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses
suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Uses Crypto APIs (Might try to encrypt user data).
-