General

  • Target

    06b523da0f9d2d52ddf3b2c76a8be5e4084bd921e363b36c7e3bb3c456aa5a39

  • Size

    3.9MB

  • Sample

    220630-snj1racbap

  • MD5

    2a0df65d94ec05fcd635ff6f1dd413e4

  • SHA1

    9db282665315e2ac6a81631428d8db5d464d6364

  • SHA256

    06b523da0f9d2d52ddf3b2c76a8be5e4084bd921e363b36c7e3bb3c456aa5a39

  • SHA512

    ce5b71f643c8ddfd0c83fed37f740a2e7f75819abaa46092c4409de1f19fc8129a0b8f9b3e79f51f83330243179ca8ffdc8f1346694f70241718afa6ccccca3f

Malware Config

Targets

    • Target

      06b523da0f9d2d52ddf3b2c76a8be5e4084bd921e363b36c7e3bb3c456aa5a39

    • Size

      3.9MB

    • MD5

      2a0df65d94ec05fcd635ff6f1dd413e4

    • SHA1

      9db282665315e2ac6a81631428d8db5d464d6364

    • SHA256

      06b523da0f9d2d52ddf3b2c76a8be5e4084bd921e363b36c7e3bb3c456aa5a39

    • SHA512

      ce5b71f643c8ddfd0c83fed37f740a2e7f75819abaa46092c4409de1f19fc8129a0b8f9b3e79f51f83330243179ca8ffdc8f1346694f70241718afa6ccccca3f

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

      suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Enterprise v6

Tasks