General
-
Target
15328ea6d31bef8ddd15a81e0f5a549b.bin
-
Size
3.3MB
-
Sample
231210-cb476abdfr
-
MD5
15328ea6d31bef8ddd15a81e0f5a549b
-
SHA1
c52f12651d91a9bf0d625a879b34d194eba69ed4
-
SHA256
a778818cc08d213d1f66db5fa8b34aabc862569ecb99fd1aea37ff6ccab48400
-
SHA512
5939a527d289315ff6d354bbd6e834ae9b3f452aebc54114a0fb46cb5422e5537ff0592aa62fbd20d753162f6a3ae56cfd97c4320613d1377a9b5a7d6a525336
-
SSDEEP
49152:qLzu436uB6iejEyNRe1kqqGI18iNwDelhcTUr4T1S0NwBbGJ3H5+ELr42SKn2IQI:qHuKB6BzReWqqGWNN8g4ETBaJ7n2Izl
Behavioral task
behavioral1
Sample
15328ea6d31bef8ddd15a81e0f5a549b.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
15328ea6d31bef8ddd15a81e0f5a549b.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
15328ea6d31bef8ddd15a81e0f5a549b.apk
Resource
android-x64-arm64-20231023-en
Malware Config
Targets
-
-
Target
15328ea6d31bef8ddd15a81e0f5a549b.bin
-
Size
3.3MB
-
MD5
15328ea6d31bef8ddd15a81e0f5a549b
-
SHA1
c52f12651d91a9bf0d625a879b34d194eba69ed4
-
SHA256
a778818cc08d213d1f66db5fa8b34aabc862569ecb99fd1aea37ff6ccab48400
-
SHA512
5939a527d289315ff6d354bbd6e834ae9b3f452aebc54114a0fb46cb5422e5537ff0592aa62fbd20d753162f6a3ae56cfd97c4320613d1377a9b5a7d6a525336
-
SSDEEP
49152:qLzu436uB6iejEyNRe1kqqGI18iNwDelhcTUr4T1S0NwBbGJ3H5+ELr42SKn2IQI:qHuKB6BzReWqqGWNN8g4ETBaJ7n2Izl
-
FluBot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-