General
-
Target
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
-
Size
5.0MB
-
Sample
220616-wxygaabaf5
-
MD5
3a0db08d86d3d57edea7d52843f32761
-
SHA1
1b24cb57faf69c2a955f1c10c911f1b16238a12c
-
SHA256
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b
-
SHA512
5e40d236ee94a9d14b66dbd282d25e0818ac3a58b04719b9bf7beb88cdaa5c99ee07f85545927d7fb3cf331972d7dfeb397fa89c57f4d6a04507014e85f45e50
Static task
static1
Behavioral task
behavioral1
Sample
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
-
Size
5.0MB
-
MD5
3a0db08d86d3d57edea7d52843f32761
-
SHA1
1b24cb57faf69c2a955f1c10c911f1b16238a12c
-
SHA256
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b
-
SHA512
5e40d236ee94a9d14b66dbd282d25e0818ac3a58b04719b9bf7beb88cdaa5c99ee07f85545927d7fb3cf331972d7dfeb397fa89c57f4d6a04507014e85f45e50
-
FluBot Payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-