General

  • Target

    0140d7fc370864a1c693dc4159cf656f27f89c7349827fdcd5cdc8218278b6f4

  • Size

    3.1MB

  • Sample

    230227-mgejssda3s

  • MD5

    df5cce61f996ffd66a93aa74e43a475f

  • SHA1

    e0ebf372b9c92ee5660a9d8f733b9b353299e5c3

  • SHA256

    0140d7fc370864a1c693dc4159cf656f27f89c7349827fdcd5cdc8218278b6f4

  • SHA512

    3426f36334e49c1c38f47a31f536c7b857f93dbae6036d1fadfdb7efe7b4d42020f4251d3b6874e09ad2348b75a658d0099951f06c56e940f3bb2e81f7b9f510

  • SSDEEP

    49152:RoXoz2acQhxIPZHhBVpKawLhKHAaTYGsXEuIm/MGBozhOhz1+Nw92flvMR5yNIjG:RoC2DQhxIPBXUYg0sX3T/fTXQf1YCoZo

Malware Config

Targets

    • Target

      0140d7fc370864a1c693dc4159cf656f27f89c7349827fdcd5cdc8218278b6f4

    • Size

      3.1MB

    • MD5

      df5cce61f996ffd66a93aa74e43a475f

    • SHA1

      e0ebf372b9c92ee5660a9d8f733b9b353299e5c3

    • SHA256

      0140d7fc370864a1c693dc4159cf656f27f89c7349827fdcd5cdc8218278b6f4

    • SHA512

      3426f36334e49c1c38f47a31f536c7b857f93dbae6036d1fadfdb7efe7b4d42020f4251d3b6874e09ad2348b75a658d0099951f06c56e940f3bb2e81f7b9f510

    • SSDEEP

      49152:RoXoz2acQhxIPZHhBVpKawLhKHAaTYGsXEuIm/MGBozhOhz1+Nw92flvMR5yNIjG:RoC2DQhxIPBXUYg0sX3T/fTXQf1YCoZo

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

MITRE ATT&CK Enterprise v6

Tasks