General

  • Target

    e93a4e8bec4e2bf47157e55be150c8fb62c38cd4ca180b473f53259fa44cdd48

  • Size

    4.2MB

  • Sample

    220616-xda3babbe3

  • MD5

    58fe07645a418f93efeeeacb04dd16c0

  • SHA1

    62a5e53b179e4b6b66f8094db788afd2e3eb550f

  • SHA256

    e93a4e8bec4e2bf47157e55be150c8fb62c38cd4ca180b473f53259fa44cdd48

  • SHA512

    2b358681bc4429b34d5777f9f778a056addfd26d0497a9a5282ead8f83cbb2845b292b3fbbd4096925b39d0dd08103d586afff7b6e7a183d5f34c8ac31a44e11

Malware Config

Targets

    • Target

      e93a4e8bec4e2bf47157e55be150c8fb62c38cd4ca180b473f53259fa44cdd48

    • Size

      4.2MB

    • MD5

      58fe07645a418f93efeeeacb04dd16c0

    • SHA1

      62a5e53b179e4b6b66f8094db788afd2e3eb550f

    • SHA256

      e93a4e8bec4e2bf47157e55be150c8fb62c38cd4ca180b473f53259fa44cdd48

    • SHA512

      2b358681bc4429b34d5777f9f778a056addfd26d0497a9a5282ead8f83cbb2845b292b3fbbd4096925b39d0dd08103d586afff7b6e7a183d5f34c8ac31a44e11

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Enterprise v6

Tasks