General

  • Target

    fc45b5f85cee56830a9f7e3001dca42026a9691445afa8f429b57203fc47a1b2.apk

  • Size

    3.3MB

  • Sample

    220616-xe3hysgfgl

  • MD5

    af9f032aecbb2c3a4f5eed9b5f675419

  • SHA1

    a0ab0777891553d9c1dced5fdafe2b9e1d5b341e

  • SHA256

    fc45b5f85cee56830a9f7e3001dca42026a9691445afa8f429b57203fc47a1b2

  • SHA512

    abec508e52c01e4b2dd822d029629eb82304faba5b8f43c0cb3566f17490ef82e644ff5e270bcfdc595d49e81ca54d40e1c59341f659e5a66bf9f97792fbe2ed

Malware Config

Targets

    • Target

      fc45b5f85cee56830a9f7e3001dca42026a9691445afa8f429b57203fc47a1b2.apk

    • Size

      3.3MB

    • MD5

      af9f032aecbb2c3a4f5eed9b5f675419

    • SHA1

      a0ab0777891553d9c1dced5fdafe2b9e1d5b341e

    • SHA256

      fc45b5f85cee56830a9f7e3001dca42026a9691445afa8f429b57203fc47a1b2

    • SHA512

      abec508e52c01e4b2dd822d029629eb82304faba5b8f43c0cb3566f17490ef82e644ff5e270bcfdc595d49e81ca54d40e1c59341f659e5a66bf9f97792fbe2ed

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

      suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Enterprise v6

Tasks