General
-
Target
68e7085eebe634fb54baaf20cd8d5cda
-
Size
2.6MB
-
Sample
231222-fhhvaaehgk
-
MD5
68e7085eebe634fb54baaf20cd8d5cda
-
SHA1
8a45da188ceb595d7564a904b0018e42e6cb6eda
-
SHA256
c8912a4ea44e34d8abbd7a40e303d1c236e1b0ee8c37ad90c96c91f006da8eff
-
SHA512
edd5f6acf650086cb3390cd2d9886544966cf92007387bf86f7c1c1019769e71093955e40b433e15c780ab50b047589b9d2e641e03bc059608ce0594b87217a2
-
SSDEEP
49152:nt6drmFXYEjfe1JVBm8V/nHMt9Nw2xO0Lav9QMmqW8bvtDkP31V:nirKZbSJVBdV/HYI2MP1QzsLtOV
Static task
static1
Behavioral task
behavioral1
Sample
68e7085eebe634fb54baaf20cd8d5cda.apk
Behavioral task
behavioral2
Sample
68e7085eebe634fb54baaf20cd8d5cda.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
68e7085eebe634fb54baaf20cd8d5cda.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
68e7085eebe634fb54baaf20cd8d5cda
-
Size
2.6MB
-
MD5
68e7085eebe634fb54baaf20cd8d5cda
-
SHA1
8a45da188ceb595d7564a904b0018e42e6cb6eda
-
SHA256
c8912a4ea44e34d8abbd7a40e303d1c236e1b0ee8c37ad90c96c91f006da8eff
-
SHA512
edd5f6acf650086cb3390cd2d9886544966cf92007387bf86f7c1c1019769e71093955e40b433e15c780ab50b047589b9d2e641e03bc059608ce0594b87217a2
-
SSDEEP
49152:nt6drmFXYEjfe1JVBm8V/nHMt9Nw2xO0Lav9QMmqW8bvtDkP31V:nirKZbSJVBdV/HYI2MP1QzsLtOV
Score10/10-
FluBot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-