Overview
overview
10Static
static
730d557fef0...d8.apk
android-9-x86
130d557fef0...d8.apk
android-10-x64
1030d557fef0...d8.apk
android-11-x64
10appboy-htm...ent.js
windows7-x64
1appboy-htm...ent.js
windows10-2004-x64
1t-rex.html
windows7-x64
1t-rex.html
windows10-2004-x64
1vk_dex.apk
android-9-x86
vk_dex.apk
android-10-x64
vk_dex.apk
android-11-x64
General
-
Target
30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8.7z
-
Size
5.3MB
-
Sample
231011-l6x7rsga8s
-
MD5
d9821bce7569f82ac31fe70da8779f53
-
SHA1
2c7ec4bf5ca05ab21a553f1ed4dc8e710ea2a09c
-
SHA256
75489e429014b5cd7cc3d0b178971eea40c07e4f063de8652cf5dd8fec58fa26
-
SHA512
44e0802677ba738c5c959ecda45f32c95f4a63e089827798baaa466488409bab8d06d8704a1ccd115c3c82b40e53503c751d7b59463647dac0098b7d9b6615a6
-
SSDEEP
98304:aCzKdNXbUKK8fYA5Ijuz+HAGfX5r23TjlPMujxdkkrwLOYebQGZQb+RmN/:fKrPKcl5Ij/gy5r233lxjxdCOYaQ2QnJ
Static task
static1
Behavioral task
behavioral1
Sample
30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
appboy-html-in-app-message-javascript-component.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
appboy-html-in-app-message-javascript-component.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
t-rex.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
t-rex.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
vk_dex.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral9
Sample
vk_dex.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral10
Sample
vk_dex.apk
Resource
android-x64-arm64-20230831-en
Malware Config
Targets
-
-
Target
30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8
-
Size
5.5MB
-
MD5
2600311823e0c228f0231650689bc751
-
SHA1
8cb68c08014f70d84f63acd0c8829a977d538a6b
-
SHA256
30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8
-
SHA512
3f0b8713613c94a40e61cef6eeb782ebb8455d12a889c46051d89ddeab68c5b2fb17c50543dd782b0f23f7887a496f6dc2a23063ce879197f5460b72e6903eff
-
SSDEEP
98304:Dmn7cHFTHHYDODB7Cg2kJ+KKLht8//i6fZKPHfrXuJsJSsfxVc3ntn5OrQ/sWYrw:Dmolz4DwBP2O+KKGiEFSJ9fxVc9nMrVu
Score10/10-
FluBot payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Crypto APIs (Might try to encrypt user data).
-
-
-
Target
appboy-html-in-app-message-javascript-component.js
-
Size
3KB
-
MD5
c12d3758fa172a40a1975cdb1f5669ac
-
SHA1
24c2a69c30703f3362b9b68d933f49dc681803fc
-
SHA256
bd5646863645108b6314045a3da03c30f0d6accf570a4bd42ce74949e1ef91df
-
SHA512
147106472163751dd156bf06b3bc70389c104fe4a43c06dfbd8e1398d929c752673238e78c007d01cbb7c66ae41098256618980662643123dd46ccb29efc5f9d
Score1/10 -
-
-
Target
t-rex.html
-
Size
80KB
-
MD5
16911fcc170c8af1c5457940bd0bf055
-
SHA1
eb44540186285271130b056fa6099b1988319fc4
-
SHA256
dc72cfc1f1d2a5013bb9de34f8cacf5e26e542d7d713fcbe09b865b4aaca6ddf
-
SHA512
131a00b7895a40ea0fb355ecc5292b3cbbcd23b45dd59b07da1b8eb86501ff0ec698ab5446687cd7ff5fba03d97b7a0b6e47196dc284a51c677cf04dbe13e393
-
SSDEEP
1536:V5OdudTTa8udsB7g1BuqHkFT5VgYzMGgbJsMPz:Vq0y80I7OuikXm3bJsMPz
Score1/10 -
-
-
Target
vk_dex.apk
-
Size
106KB
-
MD5
bc185a98eeb3c6854c2caa633295fa3b
-
SHA1
cf0b10d87d8d6459ae5b74483d7020dd496800e1
-
SHA256
da37cf4de83a645e1b3241879abe4a9e1a2fdb8a5e3f8bbe634509ac660a480d
-
SHA512
5bb4bb3aaabf3fa44260c4aec4925fd60901eaf9be83ae661bbb013ca976dc9c4c5d2debea76fc8779ecbd01cf63221b8b6be9951139a972a3b82c92c0fc1c85
-
SSDEEP
3072:nQnd9yPnoYlod2kB2zYrp42EUzHGSPIyPzKEmOZPGk9Nt:ywnblhW28ru2kSPIyPz7Gk9L
Score1/10 -