General

  • Target

    8c9d7345935d46c1602936934b600bb55fa6127cbdefd343ad5ebf03114dbe45

  • Size

    5.5MB

  • Sample

    220616-wrqjgsbac9

  • MD5

    90960e63a4d5a871f2f5617f6e26c382

  • SHA1

    efe3f8785f17d1add3642a2607ef346ea9bbf962

  • SHA256

    8c9d7345935d46c1602936934b600bb55fa6127cbdefd343ad5ebf03114dbe45

  • SHA512

    b781b2a3882bbf2a86c6759be88a69a9260363f5d47c1da963946bf0d82c86de30edd1ca6b05f861aa4e828f5d0ff0e8a7b71b931ce00f031244b59be1d323bd

Malware Config

Targets

    • Target

      8c9d7345935d46c1602936934b600bb55fa6127cbdefd343ad5ebf03114dbe45

    • Size

      5.5MB

    • MD5

      90960e63a4d5a871f2f5617f6e26c382

    • SHA1

      efe3f8785f17d1add3642a2607ef346ea9bbf962

    • SHA256

      8c9d7345935d46c1602936934b600bb55fa6127cbdefd343ad5ebf03114dbe45

    • SHA512

      b781b2a3882bbf2a86c6759be88a69a9260363f5d47c1da963946bf0d82c86de30edd1ca6b05f861aa4e828f5d0ff0e8a7b71b931ce00f031244b59be1d323bd

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks