General

  • Target

    6d52cb9d9741f1d245a4db6ca8d4f93f

  • Size

    3.3MB

  • Sample

    231222-fphsvsacb9

  • MD5

    6d52cb9d9741f1d245a4db6ca8d4f93f

  • SHA1

    8a6c24dee064ea100f2dab98b661389c2d0fc345

  • SHA256

    baf688692f368e08e71d8e6116b3caaac9aaa180dd7e1f4d376d3ba8a23391d3

  • SHA512

    5a14d56488dbd33ad816e09349cdb8164c8d25f8dcf99e76324f4552795d8c7b493ab87b7f8f11e1e85ecc571abc717936c0997ce09e21575202645ad9687e5a

  • SSDEEP

    98304:/GBGt3ZuI7y690JAD/oD4t8aS6/LTdCHb0:/SGfuI7y2oDr4

Malware Config

Targets

    • Target

      6d52cb9d9741f1d245a4db6ca8d4f93f

    • Size

      3.3MB

    • MD5

      6d52cb9d9741f1d245a4db6ca8d4f93f

    • SHA1

      8a6c24dee064ea100f2dab98b661389c2d0fc345

    • SHA256

      baf688692f368e08e71d8e6116b3caaac9aaa180dd7e1f4d376d3ba8a23391d3

    • SHA512

      5a14d56488dbd33ad816e09349cdb8164c8d25f8dcf99e76324f4552795d8c7b493ab87b7f8f11e1e85ecc571abc717936c0997ce09e21575202645ad9687e5a

    • SSDEEP

      98304:/GBGt3ZuI7y690JAD/oD4t8aS6/LTdCHb0:/SGfuI7y2oDr4

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v15

Tasks