General

  • Target

    4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa.apk

  • Size

    6.7MB

  • Sample

    220616-xcvqbsbbd8

  • MD5

    528e717abda498c72a11370631410cad

  • SHA1

    3a41286bdc3becf2f6eb6403c71ff4cce5dd6b0d

  • SHA256

    4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa

  • SHA512

    0e054e89e39fa004580575002f6df4e484cc69bf5be6eabb968acd9d854ce34e77e3fb1aa47ef6c314885667d0419ac8c656af0bee5f64dd3872be8062a14e24

Malware Config

Targets

    • Target

      4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa.apk

    • Size

      6.7MB

    • MD5

      528e717abda498c72a11370631410cad

    • SHA1

      3a41286bdc3becf2f6eb6403c71ff4cce5dd6b0d

    • SHA256

      4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa

    • SHA512

      0e054e89e39fa004580575002f6df4e484cc69bf5be6eabb968acd9d854ce34e77e3fb1aa47ef6c314885667d0419ac8c656af0bee5f64dd3872be8062a14e24

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks