General
-
Target
43b393b37cb1c99d67812f7bf0fb266536929bb44e03c0fd26448e50689be842
-
Size
4.6MB
-
Sample
220707-1yhvfafff4
-
MD5
e217d5f901d965a9571cc0e0f37acf8b
-
SHA1
8a69948f3be45c2d7f3d26f98a55f5440e0f661e
-
SHA256
43b393b37cb1c99d67812f7bf0fb266536929bb44e03c0fd26448e50689be842
-
SHA512
5d3853d4ee21b915dbb5713c2538ba4e53409247899afd95130502cd2810e873981c12e22d9ab2a5d9d7190bb5804b373c9c1d7d20fae822c8ddb9342faf19c5
Static task
static1
Behavioral task
behavioral1
Sample
43b393b37cb1c99d67812f7bf0fb266536929bb44e03c0fd26448e50689be842.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
43b393b37cb1c99d67812f7bf0fb266536929bb44e03c0fd26448e50689be842.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
43b393b37cb1c99d67812f7bf0fb266536929bb44e03c0fd26448e50689be842.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Targets
-
-
Target
43b393b37cb1c99d67812f7bf0fb266536929bb44e03c0fd26448e50689be842
-
Size
4.6MB
-
MD5
e217d5f901d965a9571cc0e0f37acf8b
-
SHA1
8a69948f3be45c2d7f3d26f98a55f5440e0f661e
-
SHA256
43b393b37cb1c99d67812f7bf0fb266536929bb44e03c0fd26448e50689be842
-
SHA512
5d3853d4ee21b915dbb5713c2538ba4e53409247899afd95130502cd2810e873981c12e22d9ab2a5d9d7190bb5804b373c9c1d7d20fae822c8ddb9342faf19c5
-
FluBot payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-