General
-
Target
7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7
-
Size
4.1MB
-
Sample
221026-3h5elshhhn
-
MD5
3acf9f6b6a813d018d643263766f06b5
-
SHA1
10bfc1b6b540b56386c335bff1399f20f63eafc9
-
SHA256
7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7
-
SHA512
db814c7c68e3b837954e3f662e1874e7909b1eca3e008ed789c91ecfceaea6f2e403d9388602f5459b043879392bdf03774bb70d6e862515f230ea9bbb8a3f96
-
SSDEEP
98304:Gw1nfyCcWUCIFy7TEWhMOvKRhMD7h3UXrtQKDEqMn:G2nRVxA0zOOdD7VwrtPIqMn
Static task
static1
Behavioral task
behavioral1
Sample
7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7
-
Size
4.1MB
-
MD5
3acf9f6b6a813d018d643263766f06b5
-
SHA1
10bfc1b6b540b56386c335bff1399f20f63eafc9
-
SHA256
7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7
-
SHA512
db814c7c68e3b837954e3f662e1874e7909b1eca3e008ed789c91ecfceaea6f2e403d9388602f5459b043879392bdf03774bb70d6e862515f230ea9bbb8a3f96
-
SSDEEP
98304:Gw1nfyCcWUCIFy7TEWhMOvKRhMD7h3UXrtQKDEqMn:G2nRVxA0zOOdD7VwrtPIqMn
Score10/10-
FluBot payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-