General

  • Target

    76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252.apk

  • Size

    6.8MB

  • Sample

    220616-wy896sgeen

  • MD5

    7a9a3c3c37885357227fb211984bbd40

  • SHA1

    8046275ad75ef2bdbf1f21f6c64d36563d5b06f4

  • SHA256

    76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252

  • SHA512

    f854d84d80bed707e9252700cfc8dfdd53132a7a9e1db0a64fafc3b01568a7970e1d73c3a23f169a76ed709aef7b58988c2dff86281fbe0eb535bb7becdf9499

Malware Config

Targets

    • Target

      76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252.apk

    • Size

      6.8MB

    • MD5

      7a9a3c3c37885357227fb211984bbd40

    • SHA1

      8046275ad75ef2bdbf1f21f6c64d36563d5b06f4

    • SHA256

      76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252

    • SHA512

      f854d84d80bed707e9252700cfc8dfdd53132a7a9e1db0a64fafc3b01568a7970e1d73c3a23f169a76ed709aef7b58988c2dff86281fbe0eb535bb7becdf9499

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks