General
-
Target
c22c7b1f473939ebaa1ae8f891065633a767a4ad84b804e1c61faa7d8ad22763
-
Size
3.8MB
-
Sample
221026-3pxcksaabr
-
MD5
c136b8d59db8d91ec022aa0151028e05
-
SHA1
9eae5b7351e1cfb35d67a78d441b9c612dce491f
-
SHA256
c22c7b1f473939ebaa1ae8f891065633a767a4ad84b804e1c61faa7d8ad22763
-
SHA512
34b0c0947f321ba8b785ed36412bbc7a59c77438962afaf0d67179232e36ab7c1d885c9f83e0384900c0c1723249f29cd8fc7548423ff647a01678d349b08fe3
-
SSDEEP
98304:tNerged/OIfZCj2e2GVoEnyAXaJMTp/fGCpQDM:t4rgtj2+/p93pQDM
Static task
static1
Behavioral task
behavioral1
Sample
c22c7b1f473939ebaa1ae8f891065633a767a4ad84b804e1c61faa7d8ad22763.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
c22c7b1f473939ebaa1ae8f891065633a767a4ad84b804e1c61faa7d8ad22763.apk
Resource
android-x64-20220823-en
Malware Config
Targets
-
-
Target
c22c7b1f473939ebaa1ae8f891065633a767a4ad84b804e1c61faa7d8ad22763
-
Size
3.8MB
-
MD5
c136b8d59db8d91ec022aa0151028e05
-
SHA1
9eae5b7351e1cfb35d67a78d441b9c612dce491f
-
SHA256
c22c7b1f473939ebaa1ae8f891065633a767a4ad84b804e1c61faa7d8ad22763
-
SHA512
34b0c0947f321ba8b785ed36412bbc7a59c77438962afaf0d67179232e36ab7c1d885c9f83e0384900c0c1723249f29cd8fc7548423ff647a01678d349b08fe3
-
SSDEEP
98304:tNerged/OIfZCj2e2GVoEnyAXaJMTp/fGCpQDM:t4rgtj2+/p93pQDM
-
FluBot payload
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-