General
-
Target
65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198
-
Size
3.0MB
-
Sample
221026-3h4hbahhhk
-
MD5
8911032f30ee0ecc589bcabfb72c0573
-
SHA1
72802bd568b2118a7de463a451cb13e20bbd88e7
-
SHA256
65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198
-
SHA512
885159589c864b92674ddba1d12516d2b7315d757c79d87bb9179b9ef28eab2a074ac921b866846902ae566250eb55ffebfc55a50af9237ad31b3c55e09c3f59
-
SSDEEP
49152:g0hCpryDHH0D6gmPOroTV8asMbUCZhSFNw/wgiNcJ3W7HxTQqUonXH3twp:gbrWn0DAOroTV87w4w/b09RzUsGp
Static task
static1
Behavioral task
behavioral1
Sample
65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198.apk
Resource
android-x64-20220823-en
Malware Config
Targets
-
-
Target
65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198
-
Size
3.0MB
-
MD5
8911032f30ee0ecc589bcabfb72c0573
-
SHA1
72802bd568b2118a7de463a451cb13e20bbd88e7
-
SHA256
65669de0e895064949130f60df5fbd94a1f30af3d5c34c8e5a22065e4334f198
-
SHA512
885159589c864b92674ddba1d12516d2b7315d757c79d87bb9179b9ef28eab2a074ac921b866846902ae566250eb55ffebfc55a50af9237ad31b3c55e09c3f59
-
SSDEEP
49152:g0hCpryDHH0D6gmPOroTV8asMbUCZhSFNw/wgiNcJ3W7HxTQqUonXH3twp:gbrWn0DAOroTV87w4w/b09RzUsGp
-
FluBot payload
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-