General

  • Target

    flubot_fe52bed001f28a4b218bcd0ad31b92fb59022778cf68a1445cf3e8c612a5e04c.zip

  • Size

    4.0MB

  • Sample

    220712-m7864afdfj

  • MD5

    d5371989516dab98a373b17e25d1164d

  • SHA1

    75e86469bc1997bb21c54531811edf94de06f4d4

  • SHA256

    4c953442147ebe89db0c35a0b57f63a746d122407cd6c8d69cb037bc00ecc940

  • SHA512

    0d3fa2bc5081b7a4afebb65b600da28b64abf140354987449a5c224493e772d6f8593cb8bab35a9369d6e62987b2f8650c76606cadaa07487335a713f84502a4

Malware Config

Targets

    • Target

      flubot_fe52bed001f28a4b218bcd0ad31b92fb59022778cf68a1445cf3e8c612a5e04c.bin

    • Size

      4.2MB

    • MD5

      37be18494cd03ea70a1fdd6270cef6e3

    • SHA1

      4714aaa5195da29c6e74aeee9e9f19678af5c15b

    • SHA256

      fe52bed001f28a4b218bcd0ad31b92fb59022778cf68a1445cf3e8c612a5e04c

    • SHA512

      5452d2e545c46b94d3209b332fea6e87727039371688e2ae63ad303c014db5e7b5d4222d4dcefd703fc4a4f15e6f685ec5e62cabe396573bed0e0f78a40d679f

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks