General
-
Target
0140d7fc370864a1c693dc4159cf656f27f89c7349827fdcd5cdc8218278b6f4
-
Size
3.1MB
-
Sample
230227-mgejssda3s
-
MD5
df5cce61f996ffd66a93aa74e43a475f
-
SHA1
e0ebf372b9c92ee5660a9d8f733b9b353299e5c3
-
SHA256
0140d7fc370864a1c693dc4159cf656f27f89c7349827fdcd5cdc8218278b6f4
-
SHA512
3426f36334e49c1c38f47a31f536c7b857f93dbae6036d1fadfdb7efe7b4d42020f4251d3b6874e09ad2348b75a658d0099951f06c56e940f3bb2e81f7b9f510
-
SSDEEP
49152:RoXoz2acQhxIPZHhBVpKawLhKHAaTYGsXEuIm/MGBozhOhz1+Nw92flvMR5yNIjG:RoC2DQhxIPBXUYg0sX3T/fTXQf1YCoZo
Static task
static1
Behavioral task
behavioral1
Sample
0140d7fc370864a1c693dc4159cf656f27f89c7349827fdcd5cdc8218278b6f4.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral2
Sample
0140d7fc370864a1c693dc4159cf656f27f89c7349827fdcd5cdc8218278b6f4.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
0140d7fc370864a1c693dc4159cf656f27f89c7349827fdcd5cdc8218278b6f4
-
Size
3.1MB
-
MD5
df5cce61f996ffd66a93aa74e43a475f
-
SHA1
e0ebf372b9c92ee5660a9d8f733b9b353299e5c3
-
SHA256
0140d7fc370864a1c693dc4159cf656f27f89c7349827fdcd5cdc8218278b6f4
-
SHA512
3426f36334e49c1c38f47a31f536c7b857f93dbae6036d1fadfdb7efe7b4d42020f4251d3b6874e09ad2348b75a658d0099951f06c56e940f3bb2e81f7b9f510
-
SSDEEP
49152:RoXoz2acQhxIPZHhBVpKawLhKHAaTYGsXEuIm/MGBozhOhz1+Nw92flvMR5yNIjG:RoC2DQhxIPBXUYg0sX3T/fTXQf1YCoZo
-
FluBot payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-