General

  • Target

    a7d5405eacbc93389d694230affda4962e1f890c5bb81b89e863493665a58ca9.apk

  • Size

    3.4MB

  • Sample

    220616-wxhqtsgedq

  • MD5

    a94fce0a8083336cf473139a85a55b77

  • SHA1

    2f80907716c46f28989b2170de553a0c371f9d16

  • SHA256

    a7d5405eacbc93389d694230affda4962e1f890c5bb81b89e863493665a58ca9

  • SHA512

    4e6a48f45cddd5cf7945c99fca86bd1cdcc02a64ae4c28e1322a8854f04a6c0538be7e7a15ca95af8f09d64dff316ff86d4d387d3b245b552cd0876e77f7c6a7

Malware Config

Targets

    • Target

      a7d5405eacbc93389d694230affda4962e1f890c5bb81b89e863493665a58ca9.apk

    • Size

      3.4MB

    • MD5

      a94fce0a8083336cf473139a85a55b77

    • SHA1

      2f80907716c46f28989b2170de553a0c371f9d16

    • SHA256

      a7d5405eacbc93389d694230affda4962e1f890c5bb81b89e863493665a58ca9

    • SHA512

      4e6a48f45cddd5cf7945c99fca86bd1cdcc02a64ae4c28e1322a8854f04a6c0538be7e7a15ca95af8f09d64dff316ff86d4d387d3b245b552cd0876e77f7c6a7

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks