General

  • Target

    cba063482ec7bac26001b67f468d84f13edf2685fd07a3103a85e71ac9ef56fb.apk

  • Size

    3.9MB

  • Sample

    220831-p76r3sgbh4

  • MD5

    55f8d0195d943a60f7bfb33681613a12

  • SHA1

    d064048e1990d927dbb025b1a7deb77044fcdf91

  • SHA256

    cba063482ec7bac26001b67f468d84f13edf2685fd07a3103a85e71ac9ef56fb

  • SHA512

    9bdb5f87316e6ef94340a0e38fdc992bea4fe324f48942dc05474671763f833d02472a4b700aa8ba702585caacc29f99649cf3a5f314257b82fc58f76439bcc8

  • SSDEEP

    98304:WzaPliKtfPe0pPJZ4NAL+KKaHI2HxdXnWi7w:aAib0pPX4qL+H2HSik

Malware Config

Targets

    • Target

      cba063482ec7bac26001b67f468d84f13edf2685fd07a3103a85e71ac9ef56fb.apk

    • Size

      3.9MB

    • MD5

      55f8d0195d943a60f7bfb33681613a12

    • SHA1

      d064048e1990d927dbb025b1a7deb77044fcdf91

    • SHA256

      cba063482ec7bac26001b67f468d84f13edf2685fd07a3103a85e71ac9ef56fb

    • SHA512

      9bdb5f87316e6ef94340a0e38fdc992bea4fe324f48942dc05474671763f833d02472a4b700aa8ba702585caacc29f99649cf3a5f314257b82fc58f76439bcc8

    • SSDEEP

      98304:WzaPliKtfPe0pPJZ4NAL+KKaHI2HxdXnWi7w:aAib0pPX4qL+H2HSik

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Enterprise v6

Tasks