General

  • Target

    2af548766f9a368e72dfab3c5bf4123da0d52f603e405e801f79a4a9c5b5c07c

  • Size

    4.0MB

  • Sample

    221026-3h2nqaaab2

  • MD5

    2ffac6c6ba63598b34dc8a076208f7b4

  • SHA1

    02d20c723835a961b594ada5c5acff8ee5ed9bab

  • SHA256

    2af548766f9a368e72dfab3c5bf4123da0d52f603e405e801f79a4a9c5b5c07c

  • SHA512

    fbb2955d883d9275bfa0f7c23ca1110ceed1b13083ec249f8445c9c203fdbd9554c36ab91b7c3634871812f3661a7a0b33dc4168b2ef0f1afcff26e370468bd8

  • SSDEEP

    98304:+1iNL19D17KA443+dt+G9ZDPAC77jZRFJhYv09Lc:7NLLZ7l4F2+97j7FJ/Lc

Malware Config

Targets

    • Target

      2af548766f9a368e72dfab3c5bf4123da0d52f603e405e801f79a4a9c5b5c07c

    • Size

      4.0MB

    • MD5

      2ffac6c6ba63598b34dc8a076208f7b4

    • SHA1

      02d20c723835a961b594ada5c5acff8ee5ed9bab

    • SHA256

      2af548766f9a368e72dfab3c5bf4123da0d52f603e405e801f79a4a9c5b5c07c

    • SHA512

      fbb2955d883d9275bfa0f7c23ca1110ceed1b13083ec249f8445c9c203fdbd9554c36ab91b7c3634871812f3661a7a0b33dc4168b2ef0f1afcff26e370468bd8

    • SSDEEP

      98304:+1iNL19D17KA443+dt+G9ZDPAC77jZRFJhYv09Lc:7NLLZ7l4F2+97j7FJ/Lc

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Enterprise v6

Tasks