General

  • Target

    16ff2005a5edf5796cadb56258fdbd1e34f7e9a850bfb6f23a5ab5b969d47f19

  • Size

    3.3MB

  • Sample

    221026-3h1fnaaaa8

  • MD5

    7e97532091767c01d5b426c4d0726fff

  • SHA1

    99828b200a44302507ed272c3fad84cc9747924d

  • SHA256

    16ff2005a5edf5796cadb56258fdbd1e34f7e9a850bfb6f23a5ab5b969d47f19

  • SHA512

    7994e440985226af7455f58e1f54bd37ad51fd27999d5c8023d240eb966111fb8058e6dcf183aeb8566d648f5f5d6d22d5f76a016649a7e7f7c5a9729792cb64

  • SSDEEP

    98304:+1Yg6KjW5BJcfAWod/ZvrbgMB4HrpolkUOlwz:ES+WPSEd/FrbgMAylAwz

Malware Config

Targets

    • Target

      16ff2005a5edf5796cadb56258fdbd1e34f7e9a850bfb6f23a5ab5b969d47f19

    • Size

      3.3MB

    • MD5

      7e97532091767c01d5b426c4d0726fff

    • SHA1

      99828b200a44302507ed272c3fad84cc9747924d

    • SHA256

      16ff2005a5edf5796cadb56258fdbd1e34f7e9a850bfb6f23a5ab5b969d47f19

    • SHA512

      7994e440985226af7455f58e1f54bd37ad51fd27999d5c8023d240eb966111fb8058e6dcf183aeb8566d648f5f5d6d22d5f76a016649a7e7f7c5a9729792cb64

    • SSDEEP

      98304:+1Yg6KjW5BJcfAWod/ZvrbgMB4HrpolkUOlwz:ES+WPSEd/FrbgMAylAwz

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Enterprise v6

Tasks