General

  • Target

    bdc9e00b8add78d653fa930d6db418ec

  • Size

    3.3MB

  • Sample

    231222-rma6sabdh4

  • MD5

    bdc9e00b8add78d653fa930d6db418ec

  • SHA1

    b79ee813415ba6a1720db77ad5d94344496d40ce

  • SHA256

    25b41f00a0a402e18f75883bd2d7df432b51073eb21fda5383804e55c0ae271a

  • SHA512

    974bb94ea2597f6117360463f0341d3ec0474776edddcf6a2b32798e25529d2e9525c5d7edcb6f6eb8ae931ec488f73c569d345d009ea73d6180ae9a970cbe58

  • SSDEEP

    98304:gzqGt3ZuI7y690JAD/oD42zXb6/LTdCHy4:gGGfuI7y2oDtn

Malware Config

Targets

    • Target

      bdc9e00b8add78d653fa930d6db418ec

    • Size

      3.3MB

    • MD5

      bdc9e00b8add78d653fa930d6db418ec

    • SHA1

      b79ee813415ba6a1720db77ad5d94344496d40ce

    • SHA256

      25b41f00a0a402e18f75883bd2d7df432b51073eb21fda5383804e55c0ae271a

    • SHA512

      974bb94ea2597f6117360463f0341d3ec0474776edddcf6a2b32798e25529d2e9525c5d7edcb6f6eb8ae931ec488f73c569d345d009ea73d6180ae9a970cbe58

    • SSDEEP

      98304:gzqGt3ZuI7y690JAD/oD42zXb6/LTdCHy4:gGGfuI7y2oDtn

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v15

Tasks