General
-
Target
97206706b5aa31cebb8ac30102632d3072bd00b1bc6d9a097db417974dca69a5
-
Size
4.5MB
-
Sample
231220-kmjplagab3
-
MD5
f9a79cb761afbb4315840408e14c5a6b
-
SHA1
f5e6549a76e9713f961fa9c7855b9cc9ffc5cf0a
-
SHA256
97206706b5aa31cebb8ac30102632d3072bd00b1bc6d9a097db417974dca69a5
-
SHA512
d9b92df7f9ae8c4d8f36c93f454c4df84b609aab94910bca73fdff7db673fbec2490ab38adb634c9006c7690c6064bf0c4edd4acf236add6f93d9f7fa99e9f7d
-
SSDEEP
98304:6ybtPX2a3eE3ldgwnvK6t9bVCNJd1IWTryoa:NbrOE3lqwnvKu9bVC3zIOm
Static task
static1
Behavioral task
behavioral1
Sample
97206706b5aa31cebb8ac30102632d3072bd00b1bc6d9a097db417974dca69a5.apk
Behavioral task
behavioral2
Sample
97206706b5aa31cebb8ac30102632d3072bd00b1bc6d9a097db417974dca69a5.apk
Resource
android-x64-20231215-en
Malware Config
Targets
-
-
Target
97206706b5aa31cebb8ac30102632d3072bd00b1bc6d9a097db417974dca69a5
-
Size
4.5MB
-
MD5
f9a79cb761afbb4315840408e14c5a6b
-
SHA1
f5e6549a76e9713f961fa9c7855b9cc9ffc5cf0a
-
SHA256
97206706b5aa31cebb8ac30102632d3072bd00b1bc6d9a097db417974dca69a5
-
SHA512
d9b92df7f9ae8c4d8f36c93f454c4df84b609aab94910bca73fdff7db673fbec2490ab38adb634c9006c7690c6064bf0c4edd4acf236add6f93d9f7fa99e9f7d
-
SSDEEP
98304:6ybtPX2a3eE3ldgwnvK6t9bVCNJd1IWTryoa:NbrOE3lqwnvKu9bVC3zIOm
-
FluBot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-