Overview
overview
10Static
static
764364f6cf1...d6.apk
android-9-x86
164364f6cf1...d6.apk
android-10-x64
1064364f6cf1...d6.apk
android-11-x64
10appboy-htm...ent.js
windows7-x64
1appboy-htm...ent.js
windows10-2004-x64
1t-rex.html
windows7-x64
1t-rex.html
windows10-2004-x64
1vk_dex.apk
android-9-x86
vk_dex.apk
android-10-x64
vk_dex.apk
android-11-x64
General
-
Target
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6.7z
-
Size
5.3MB
-
Sample
231011-l6pkmaaa75
-
MD5
22ef3791e53da4cd9e2b2a734401a1e0
-
SHA1
a82d8fc8f61d26610c633a3b2748e70f566bd3d0
-
SHA256
4f25a05ca878bb55a683b3c3f14f4b3c1b183a74dd2c6c9054d880966293ee06
-
SHA512
0d889f819a0d301b95a9efd3d0aa0116393bc0f890a31ee5fa9be75e45119c281661c94c2717d0614ca85b98217725c14466dcb9b2c9bec79247fb256cb4ec41
-
SSDEEP
98304:nHinMzthTFXe/bItgkIZdTkrmr+3qNKW1A0hfK7Zpj6OHXjds5NWH8An4L4smfZq:HjtD6zLwrR3wA09o1Xx2w/smfZ6Hsc
Static task
static1
Behavioral task
behavioral1
Sample
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
appboy-html-in-app-message-javascript-component.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
appboy-html-in-app-message-javascript-component.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
t-rex.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
t-rex.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
vk_dex.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral9
Sample
vk_dex.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral10
Sample
vk_dex.apk
Resource
android-x64-arm64-20230831-en
Malware Config
Targets
-
-
Target
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6
-
Size
5.5MB
-
MD5
e57a895fcd7ac5579e7da4bab7e355b8
-
SHA1
9a992c72d8ba10b2e3350fff6a8d7e3a5955db54
-
SHA256
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6
-
SHA512
6c4d57a11629ae86f9a22a7da265b2ef2644d7e690754d89e6bb573e469e315fbb20dd34d3d7bd7cb5628a001ab137103c9f617e84242588c1cc1e0c326bdbbd
-
SSDEEP
98304:CcifY3Vl4SxOzYtK34GOfg0BVGhrDRosH8Hy0dMOdbV8fm6H8rTrXdztWR23W3Q:CciA02dKdOfvVGhrGscH9MgafmcI5W8X
Score10/10-
FluBot payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Crypto APIs (Might try to encrypt user data).
-
-
-
Target
appboy-html-in-app-message-javascript-component.js
-
Size
3KB
-
MD5
c12d3758fa172a40a1975cdb1f5669ac
-
SHA1
24c2a69c30703f3362b9b68d933f49dc681803fc
-
SHA256
bd5646863645108b6314045a3da03c30f0d6accf570a4bd42ce74949e1ef91df
-
SHA512
147106472163751dd156bf06b3bc70389c104fe4a43c06dfbd8e1398d929c752673238e78c007d01cbb7c66ae41098256618980662643123dd46ccb29efc5f9d
Score1/10 -
-
-
Target
t-rex.html
-
Size
80KB
-
MD5
16911fcc170c8af1c5457940bd0bf055
-
SHA1
eb44540186285271130b056fa6099b1988319fc4
-
SHA256
dc72cfc1f1d2a5013bb9de34f8cacf5e26e542d7d713fcbe09b865b4aaca6ddf
-
SHA512
131a00b7895a40ea0fb355ecc5292b3cbbcd23b45dd59b07da1b8eb86501ff0ec698ab5446687cd7ff5fba03d97b7a0b6e47196dc284a51c677cf04dbe13e393
-
SSDEEP
1536:V5OdudTTa8udsB7g1BuqHkFT5VgYzMGgbJsMPz:Vq0y80I7OuikXm3bJsMPz
Score1/10 -
-
-
Target
vk_dex.apk
-
Size
106KB
-
MD5
bc185a98eeb3c6854c2caa633295fa3b
-
SHA1
cf0b10d87d8d6459ae5b74483d7020dd496800e1
-
SHA256
da37cf4de83a645e1b3241879abe4a9e1a2fdb8a5e3f8bbe634509ac660a480d
-
SHA512
5bb4bb3aaabf3fa44260c4aec4925fd60901eaf9be83ae661bbb013ca976dc9c4c5d2debea76fc8779ecbd01cf63221b8b6be9951139a972a3b82c92c0fc1c85
-
SSDEEP
3072:nQnd9yPnoYlod2kB2zYrp42EUzHGSPIyPzKEmOZPGk9Nt:ywnblhW28ru2kSPIyPz7Gk9L
Score1/10 -