General
-
Target
2af548766f9a368e72dfab3c5bf4123da0d52f603e405e801f79a4a9c5b5c07c
-
Size
4.0MB
-
Sample
221026-3h2nqaaab2
-
MD5
2ffac6c6ba63598b34dc8a076208f7b4
-
SHA1
02d20c723835a961b594ada5c5acff8ee5ed9bab
-
SHA256
2af548766f9a368e72dfab3c5bf4123da0d52f603e405e801f79a4a9c5b5c07c
-
SHA512
fbb2955d883d9275bfa0f7c23ca1110ceed1b13083ec249f8445c9c203fdbd9554c36ab91b7c3634871812f3661a7a0b33dc4168b2ef0f1afcff26e370468bd8
-
SSDEEP
98304:+1iNL19D17KA443+dt+G9ZDPAC77jZRFJhYv09Lc:7NLLZ7l4F2+97j7FJ/Lc
Static task
static1
Behavioral task
behavioral1
Sample
2af548766f9a368e72dfab3c5bf4123da0d52f603e405e801f79a4a9c5b5c07c.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
2af548766f9a368e72dfab3c5bf4123da0d52f603e405e801f79a4a9c5b5c07c.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
2af548766f9a368e72dfab3c5bf4123da0d52f603e405e801f79a4a9c5b5c07c.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
2af548766f9a368e72dfab3c5bf4123da0d52f603e405e801f79a4a9c5b5c07c
-
Size
4.0MB
-
MD5
2ffac6c6ba63598b34dc8a076208f7b4
-
SHA1
02d20c723835a961b594ada5c5acff8ee5ed9bab
-
SHA256
2af548766f9a368e72dfab3c5bf4123da0d52f603e405e801f79a4a9c5b5c07c
-
SHA512
fbb2955d883d9275bfa0f7c23ca1110ceed1b13083ec249f8445c9c203fdbd9554c36ab91b7c3634871812f3661a7a0b33dc4168b2ef0f1afcff26e370468bd8
-
SSDEEP
98304:+1iNL19D17KA443+dt+G9ZDPAC77jZRFJhYv09Lc:7NLLZ7l4F2+97j7FJ/Lc
-
FluBot payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Uses Crypto APIs (Might try to encrypt user data).
-