General

  • Target

    607ceb008d54328c885339fc2d793286834e887b2a328129455343bb8867698b.apk

  • Size

    4.3MB

  • Sample

    220616-wvrwqabae4

  • MD5

    a45dc99d0d146524d608691f86d00d63

  • SHA1

    563551eeb18bd5c2889d3ce98462912148189d0f

  • SHA256

    607ceb008d54328c885339fc2d793286834e887b2a328129455343bb8867698b

  • SHA512

    a6e6cb676e89c581f2343cf7e3bb2dc1744e8038a063bc5cf17d3ab53df3a1e3dd6b0c8edab58982ee48518be0d488a47454b639a0a6a67be1d1cd1609d0a2b6

Malware Config

Targets

    • Target

      607ceb008d54328c885339fc2d793286834e887b2a328129455343bb8867698b.apk

    • Size

      4.3MB

    • MD5

      a45dc99d0d146524d608691f86d00d63

    • SHA1

      563551eeb18bd5c2889d3ce98462912148189d0f

    • SHA256

      607ceb008d54328c885339fc2d793286834e887b2a328129455343bb8867698b

    • SHA512

      a6e6cb676e89c581f2343cf7e3bb2dc1744e8038a063bc5cf17d3ab53df3a1e3dd6b0c8edab58982ee48518be0d488a47454b639a0a6a67be1d1cd1609d0a2b6

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

      suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Enterprise v6

Tasks