General

  • Target

    4d3ea6e701b950516b89a4be889a31635e9f892705f34345017d323bfcd6e110.apk

  • Size

    4.0MB

  • Sample

    220616-wv7xyabae5

  • MD5

    6f049fc4e5f85d53d1aaa158412edca3

  • SHA1

    d23d638b224dbbdb6ace0bdc3271fc17a924007c

  • SHA256

    4d3ea6e701b950516b89a4be889a31635e9f892705f34345017d323bfcd6e110

  • SHA512

    084ade2f99dbc69de0d4c84535756da2db8f894b56f610826437d80e3747de39a08508c4411f2f2cfeef05639534a13e47e2737e0033c6b881f60781d2d20fde

Malware Config

Targets

    • Target

      4d3ea6e701b950516b89a4be889a31635e9f892705f34345017d323bfcd6e110.apk

    • Size

      4.0MB

    • MD5

      6f049fc4e5f85d53d1aaa158412edca3

    • SHA1

      d23d638b224dbbdb6ace0bdc3271fc17a924007c

    • SHA256

      4d3ea6e701b950516b89a4be889a31635e9f892705f34345017d323bfcd6e110

    • SHA512

      084ade2f99dbc69de0d4c84535756da2db8f894b56f610826437d80e3747de39a08508c4411f2f2cfeef05639534a13e47e2737e0033c6b881f60781d2d20fde

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks