General
-
Target
4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa
-
Size
6.7MB
-
Sample
231223-t6321shfej
-
MD5
528e717abda498c72a11370631410cad
-
SHA1
3a41286bdc3becf2f6eb6403c71ff4cce5dd6b0d
-
SHA256
4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa
-
SHA512
0e054e89e39fa004580575002f6df4e484cc69bf5be6eabb968acd9d854ce34e77e3fb1aa47ef6c314885667d0419ac8c656af0bee5f64dd3872be8062a14e24
-
SSDEEP
196608:POeipkzfuE7GiqwZy9c9UlaxsXfZmV91g2ZbJolK0xxBk:meh7upiBZy90Ul/RmauolxxTk
Static task
static1
Behavioral task
behavioral1
Sample
4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa
-
Size
6.7MB
-
MD5
528e717abda498c72a11370631410cad
-
SHA1
3a41286bdc3becf2f6eb6403c71ff4cce5dd6b0d
-
SHA256
4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa
-
SHA512
0e054e89e39fa004580575002f6df4e484cc69bf5be6eabb968acd9d854ce34e77e3fb1aa47ef6c314885667d0419ac8c656af0bee5f64dd3872be8062a14e24
-
SSDEEP
196608:POeipkzfuE7GiqwZy9c9UlaxsXfZmV91g2ZbJolK0xxBk:meh7upiBZy90Ul/RmauolxxTk
Score10/10-
FluBot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-