General

  • Target

    65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198

  • Size

    3.0MB

  • Sample

    221026-3h4hbahhhk

  • MD5

    8911032f30ee0ecc589bcabfb72c0573

  • SHA1

    72802bd568b2118a7de463a451cb13e20bbd88e7

  • SHA256

    65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198

  • SHA512

    885159589c864b92674ddba1d12516d2b7315d757c79d87bb9179b9ef28eab2a074ac921b866846902ae566250eb55ffebfc55a50af9237ad31b3c55e09c3f59

  • SSDEEP

    49152:g0hCpryDHH0D6gmPOroTV8asMbUCZhSFNw/wgiNcJ3W7HxTQqUonXH3twp:gbrWn0DAOroTV87w4w/b09RzUsGp

Malware Config

Targets

    • Target

      65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198

    • Size

      3.0MB

    • MD5

      8911032f30ee0ecc589bcabfb72c0573

    • SHA1

      72802bd568b2118a7de463a451cb13e20bbd88e7

    • SHA256

      65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198

    • SHA512

      885159589c864b92674ddba1d12516d2b7315d757c79d87bb9179b9ef28eab2a074ac921b866846902ae566250eb55ffebfc55a50af9237ad31b3c55e09c3f59

    • SSDEEP

      49152:g0hCpryDHH0D6gmPOroTV8asMbUCZhSFNw/wgiNcJ3W7HxTQqUonXH3twp:gbrWn0DAOroTV87w4w/b09RzUsGp

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

MITRE ATT&CK Enterprise v6

Tasks