General
-
Target
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6
-
Size
5.5MB
-
Sample
220616-xfyw6agfgq
-
MD5
e57a895fcd7ac5579e7da4bab7e355b8
-
SHA1
9a992c72d8ba10b2e3350fff6a8d7e3a5955db54
-
SHA256
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6
-
SHA512
6c4d57a11629ae86f9a22a7da265b2ef2644d7e690754d89e6bb573e469e315fbb20dd34d3d7bd7cb5628a001ab137103c9f617e84242588c1cc1e0c326bdbbd
Static task
static1
Behavioral task
behavioral1
Sample
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6
-
Size
5.5MB
-
MD5
e57a895fcd7ac5579e7da4bab7e355b8
-
SHA1
9a992c72d8ba10b2e3350fff6a8d7e3a5955db54
-
SHA256
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6
-
SHA512
6c4d57a11629ae86f9a22a7da265b2ef2644d7e690754d89e6bb573e469e315fbb20dd34d3d7bd7cb5628a001ab137103c9f617e84242588c1cc1e0c326bdbbd
Score10/10-
FluBot Payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Crypto APIs (Might try to encrypt user data).
-