General

  • Target

    64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6.7z

  • Size

    5.3MB

  • Sample

    231011-l6pkmaaa75

  • MD5

    22ef3791e53da4cd9e2b2a734401a1e0

  • SHA1

    a82d8fc8f61d26610c633a3b2748e70f566bd3d0

  • SHA256

    4f25a05ca878bb55a683b3c3f14f4b3c1b183a74dd2c6c9054d880966293ee06

  • SHA512

    0d889f819a0d301b95a9efd3d0aa0116393bc0f890a31ee5fa9be75e45119c281661c94c2717d0614ca85b98217725c14466dcb9b2c9bec79247fb256cb4ec41

  • SSDEEP

    98304:nHinMzthTFXe/bItgkIZdTkrmr+3qNKW1A0hfK7Zpj6OHXjds5NWH8An4L4smfZq:HjtD6zLwrR3wA09o1Xx2w/smfZ6Hsc

Malware Config

Targets

    • Target

      64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6

    • Size

      5.5MB

    • MD5

      e57a895fcd7ac5579e7da4bab7e355b8

    • SHA1

      9a992c72d8ba10b2e3350fff6a8d7e3a5955db54

    • SHA256

      64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6

    • SHA512

      6c4d57a11629ae86f9a22a7da265b2ef2644d7e690754d89e6bb573e469e315fbb20dd34d3d7bd7cb5628a001ab137103c9f617e84242588c1cc1e0c326bdbbd

    • SSDEEP

      98304:CcifY3Vl4SxOzYtK34GOfg0BVGhrDRosH8Hy0dMOdbV8fm6H8rTrXdztWR23W3Q:CciA02dKdOfvVGhrGscH9MgafmcI5W8X

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Crypto APIs (Might try to encrypt user data).

    • Target

      appboy-html-in-app-message-javascript-component.js

    • Size

      3KB

    • MD5

      c12d3758fa172a40a1975cdb1f5669ac

    • SHA1

      24c2a69c30703f3362b9b68d933f49dc681803fc

    • SHA256

      bd5646863645108b6314045a3da03c30f0d6accf570a4bd42ce74949e1ef91df

    • SHA512

      147106472163751dd156bf06b3bc70389c104fe4a43c06dfbd8e1398d929c752673238e78c007d01cbb7c66ae41098256618980662643123dd46ccb29efc5f9d

    Score
    1/10
    • Target

      t-rex.html

    • Size

      80KB

    • MD5

      16911fcc170c8af1c5457940bd0bf055

    • SHA1

      eb44540186285271130b056fa6099b1988319fc4

    • SHA256

      dc72cfc1f1d2a5013bb9de34f8cacf5e26e542d7d713fcbe09b865b4aaca6ddf

    • SHA512

      131a00b7895a40ea0fb355ecc5292b3cbbcd23b45dd59b07da1b8eb86501ff0ec698ab5446687cd7ff5fba03d97b7a0b6e47196dc284a51c677cf04dbe13e393

    • SSDEEP

      1536:V5OdudTTa8udsB7g1BuqHkFT5VgYzMGgbJsMPz:Vq0y80I7OuikXm3bJsMPz

    Score
    1/10
    • Target

      vk_dex.apk

    • Size

      106KB

    • MD5

      bc185a98eeb3c6854c2caa633295fa3b

    • SHA1

      cf0b10d87d8d6459ae5b74483d7020dd496800e1

    • SHA256

      da37cf4de83a645e1b3241879abe4a9e1a2fdb8a5e3f8bbe634509ac660a480d

    • SHA512

      5bb4bb3aaabf3fa44260c4aec4925fd60901eaf9be83ae661bbb013ca976dc9c4c5d2debea76fc8779ecbd01cf63221b8b6be9951139a972a3b82c92c0fc1c85

    • SSDEEP

      3072:nQnd9yPnoYlod2kB2zYrp42EUzHGSPIyPzKEmOZPGk9Nt:ywnblhW28ru2kSPIyPz7Gk9L

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks