General

  • Target

    30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8.7z

  • Size

    5.3MB

  • Sample

    231011-l6x7rsga8s

  • MD5

    d9821bce7569f82ac31fe70da8779f53

  • SHA1

    2c7ec4bf5ca05ab21a553f1ed4dc8e710ea2a09c

  • SHA256

    75489e429014b5cd7cc3d0b178971eea40c07e4f063de8652cf5dd8fec58fa26

  • SHA512

    44e0802677ba738c5c959ecda45f32c95f4a63e089827798baaa466488409bab8d06d8704a1ccd115c3c82b40e53503c751d7b59463647dac0098b7d9b6615a6

  • SSDEEP

    98304:aCzKdNXbUKK8fYA5Ijuz+HAGfX5r23TjlPMujxdkkrwLOYebQGZQb+RmN/:fKrPKcl5Ij/gy5r233lxjxdCOYaQ2QnJ

Malware Config

Targets

    • Target

      30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8

    • Size

      5.5MB

    • MD5

      2600311823e0c228f0231650689bc751

    • SHA1

      8cb68c08014f70d84f63acd0c8829a977d538a6b

    • SHA256

      30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8

    • SHA512

      3f0b8713613c94a40e61cef6eeb782ebb8455d12a889c46051d89ddeab68c5b2fb17c50543dd782b0f23f7887a496f6dc2a23063ce879197f5460b72e6903eff

    • SSDEEP

      98304:Dmn7cHFTHHYDODB7Cg2kJ+KKLht8//i6fZKPHfrXuJsJSsfxVc3ntn5OrQ/sWYrw:Dmolz4DwBP2O+KKGiEFSJ9fxVc9nMrVu

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Crypto APIs (Might try to encrypt user data).

    • Target

      appboy-html-in-app-message-javascript-component.js

    • Size

      3KB

    • MD5

      c12d3758fa172a40a1975cdb1f5669ac

    • SHA1

      24c2a69c30703f3362b9b68d933f49dc681803fc

    • SHA256

      bd5646863645108b6314045a3da03c30f0d6accf570a4bd42ce74949e1ef91df

    • SHA512

      147106472163751dd156bf06b3bc70389c104fe4a43c06dfbd8e1398d929c752673238e78c007d01cbb7c66ae41098256618980662643123dd46ccb29efc5f9d

    Score
    1/10
    • Target

      t-rex.html

    • Size

      80KB

    • MD5

      16911fcc170c8af1c5457940bd0bf055

    • SHA1

      eb44540186285271130b056fa6099b1988319fc4

    • SHA256

      dc72cfc1f1d2a5013bb9de34f8cacf5e26e542d7d713fcbe09b865b4aaca6ddf

    • SHA512

      131a00b7895a40ea0fb355ecc5292b3cbbcd23b45dd59b07da1b8eb86501ff0ec698ab5446687cd7ff5fba03d97b7a0b6e47196dc284a51c677cf04dbe13e393

    • SSDEEP

      1536:V5OdudTTa8udsB7g1BuqHkFT5VgYzMGgbJsMPz:Vq0y80I7OuikXm3bJsMPz

    Score
    1/10
    • Target

      vk_dex.apk

    • Size

      106KB

    • MD5

      bc185a98eeb3c6854c2caa633295fa3b

    • SHA1

      cf0b10d87d8d6459ae5b74483d7020dd496800e1

    • SHA256

      da37cf4de83a645e1b3241879abe4a9e1a2fdb8a5e3f8bbe634509ac660a480d

    • SHA512

      5bb4bb3aaabf3fa44260c4aec4925fd60901eaf9be83ae661bbb013ca976dc9c4c5d2debea76fc8779ecbd01cf63221b8b6be9951139a972a3b82c92c0fc1c85

    • SSDEEP

      3072:nQnd9yPnoYlod2kB2zYrp42EUzHGSPIyPzKEmOZPGk9Nt:ywnblhW28ru2kSPIyPz7Gk9L

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks