General

  • Target

    8fd1dbdb76379205f545cb4262e36e2b486d52f604367121ec39e112e62d2efaa

  • Size

    4.5MB

  • Sample

    220616-wr6kpsgebj

  • MD5

    2b26b4dd18ca1d2f588fc95b2e09fdd9

  • SHA1

    63520604747d2a09104cd0dd20bc8c6e4c42f3a0

  • SHA256

    8fd1dbdb76379205f545cb4262e36e2b486d52f604367121ec39e112e62d2efa

  • SHA512

    e5ce70694416b6540fa4f867a0cc9fd16d28981645fd861e6c9425bc0c221a4e38b20e0e1a9606e073c54ae11fba2f24c7dfb863e51023dc812a93f30f1a062d

Malware Config

Targets

    • Target

      8fd1dbdb76379205f545cb4262e36e2b486d52f604367121ec39e112e62d2efaa

    • Size

      4.5MB

    • MD5

      2b26b4dd18ca1d2f588fc95b2e09fdd9

    • SHA1

      63520604747d2a09104cd0dd20bc8c6e4c42f3a0

    • SHA256

      8fd1dbdb76379205f545cb4262e36e2b486d52f604367121ec39e112e62d2efa

    • SHA512

      e5ce70694416b6540fa4f867a0cc9fd16d28981645fd861e6c9425bc0c221a4e38b20e0e1a9606e073c54ae11fba2f24c7dfb863e51023dc812a93f30f1a062d

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks