General

  • Target

    010e254eb6bf9494becdd888901245e1ccd03e5421a0996e59c102ac819dc202

  • Size

    3.3MB

  • Sample

    220804-3fxxracdc3

  • MD5

    a7b162b55d1e152244aae828a156fc40

  • SHA1

    049e5c032000259d053998db6844b6c76b30ab5d

  • SHA256

    010e254eb6bf9494becdd888901245e1ccd03e5421a0996e59c102ac819dc202

  • SHA512

    24526bc5ffcf4a173bfca984af7db0f1c4141c57a09086ba385401eddd39acdc64f263f00c971cd9d9f923191b4f8c66d6b0da18fca91ccc517cba51d74ee4cd

Malware Config

Targets

    • Target

      010e254eb6bf9494becdd888901245e1ccd03e5421a0996e59c102ac819dc202

    • Size

      3.3MB

    • MD5

      a7b162b55d1e152244aae828a156fc40

    • SHA1

      049e5c032000259d053998db6844b6c76b30ab5d

    • SHA256

      010e254eb6bf9494becdd888901245e1ccd03e5421a0996e59c102ac819dc202

    • SHA512

      24526bc5ffcf4a173bfca984af7db0f1c4141c57a09086ba385401eddd39acdc64f263f00c971cd9d9f923191b4f8c66d6b0da18fca91ccc517cba51d74ee4cd

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Enterprise v6

Tasks