General

  • Target

    8c9d7345935d46c1602936934b600bb55fa6127cbdefd343ad5ebf03114dbe45.7z

  • Size

    5.3MB

  • Sample

    231011-l665nsab34

  • MD5

    8d356d4176bd812c7080973ee9ef39c6

  • SHA1

    2ba7c51c3766db8017845240dbac63e15d667f0a

  • SHA256

    460f82e3ae566f5334d21205d57e5b5b5bef28bacae5e8aa9e8e7befd525003a

  • SHA512

    d17531a84c17d7149b2822ac884eb216c183d17d71f4f2ed10c62f11d0569f280820d080955a6b107e04c1e6ecc3e8e13866b0a7272032d67f0ecf3e109e8e63

  • SSDEEP

    98304:1IWQ7AYpaWOxCfbx7YpR7S5G3Bd5vn/tjFIw2YxnhCH3vowQcWiPWF:1kcRWO8g33r5vnVhVXAvnbWiPWF

Malware Config

Targets

    • Target

      8c9d7345935d46c1602936934b600bb55fa6127cbdefd343ad5ebf03114dbe45

    • Size

      5.5MB

    • MD5

      90960e63a4d5a871f2f5617f6e26c382

    • SHA1

      efe3f8785f17d1add3642a2607ef346ea9bbf962

    • SHA256

      8c9d7345935d46c1602936934b600bb55fa6127cbdefd343ad5ebf03114dbe45

    • SHA512

      b781b2a3882bbf2a86c6759be88a69a9260363f5d47c1da963946bf0d82c86de30edd1ca6b05f861aa4e828f5d0ff0e8a7b71b931ce00f031244b59be1d323bd

    • SSDEEP

      98304:2x2natN0Gwuybg0chHxA/PfECifHyUiCAnBT7rXxrZSFES2PHsQMnZvgnfe3W3S7:2x9735ypcJxA/oLArFSqPHsQMAe3P7

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Crypto APIs (Might try to encrypt user data).

    • Target

      appboy-html-in-app-message-javascript-component.js

    • Size

      3KB

    • MD5

      c12d3758fa172a40a1975cdb1f5669ac

    • SHA1

      24c2a69c30703f3362b9b68d933f49dc681803fc

    • SHA256

      bd5646863645108b6314045a3da03c30f0d6accf570a4bd42ce74949e1ef91df

    • SHA512

      147106472163751dd156bf06b3bc70389c104fe4a43c06dfbd8e1398d929c752673238e78c007d01cbb7c66ae41098256618980662643123dd46ccb29efc5f9d

    Score
    1/10
    • Target

      t-rex.html

    • Size

      80KB

    • MD5

      16911fcc170c8af1c5457940bd0bf055

    • SHA1

      eb44540186285271130b056fa6099b1988319fc4

    • SHA256

      dc72cfc1f1d2a5013bb9de34f8cacf5e26e542d7d713fcbe09b865b4aaca6ddf

    • SHA512

      131a00b7895a40ea0fb355ecc5292b3cbbcd23b45dd59b07da1b8eb86501ff0ec698ab5446687cd7ff5fba03d97b7a0b6e47196dc284a51c677cf04dbe13e393

    • SSDEEP

      1536:V5OdudTTa8udsB7g1BuqHkFT5VgYzMGgbJsMPz:Vq0y80I7OuikXm3bJsMPz

    Score
    1/10
    • Target

      vk_dex.apk

    • Size

      106KB

    • MD5

      bc185a98eeb3c6854c2caa633295fa3b

    • SHA1

      cf0b10d87d8d6459ae5b74483d7020dd496800e1

    • SHA256

      da37cf4de83a645e1b3241879abe4a9e1a2fdb8a5e3f8bbe634509ac660a480d

    • SHA512

      5bb4bb3aaabf3fa44260c4aec4925fd60901eaf9be83ae661bbb013ca976dc9c4c5d2debea76fc8779ecbd01cf63221b8b6be9951139a972a3b82c92c0fc1c85

    • SSDEEP

      3072:nQnd9yPnoYlod2kB2zYrp42EUzHGSPIyPzKEmOZPGk9Nt:ywnblhW28ru2kSPIyPz7Gk9L

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks