General

  • Target

    fe52bed001f28a4b218bcd0ad31b92fb59022778cf68a1445cf3e8c612a5e04c

  • Size

    4.2MB

  • Sample

    220627-gmxpnsbbh9

  • MD5

    37be18494cd03ea70a1fdd6270cef6e3

  • SHA1

    4714aaa5195da29c6e74aeee9e9f19678af5c15b

  • SHA256

    fe52bed001f28a4b218bcd0ad31b92fb59022778cf68a1445cf3e8c612a5e04c

  • SHA512

    5452d2e545c46b94d3209b332fea6e87727039371688e2ae63ad303c014db5e7b5d4222d4dcefd703fc4a4f15e6f685ec5e62cabe396573bed0e0f78a40d679f

Malware Config

Targets

    • Target

      fe52bed001f28a4b218bcd0ad31b92fb59022778cf68a1445cf3e8c612a5e04c

    • Size

      4.2MB

    • MD5

      37be18494cd03ea70a1fdd6270cef6e3

    • SHA1

      4714aaa5195da29c6e74aeee9e9f19678af5c15b

    • SHA256

      fe52bed001f28a4b218bcd0ad31b92fb59022778cf68a1445cf3e8c612a5e04c

    • SHA512

      5452d2e545c46b94d3209b332fea6e87727039371688e2ae63ad303c014db5e7b5d4222d4dcefd703fc4a4f15e6f685ec5e62cabe396573bed0e0f78a40d679f

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks