General

  • Target

    4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa

  • Size

    6.7MB

  • Sample

    231223-t6321shfej

  • MD5

    528e717abda498c72a11370631410cad

  • SHA1

    3a41286bdc3becf2f6eb6403c71ff4cce5dd6b0d

  • SHA256

    4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa

  • SHA512

    0e054e89e39fa004580575002f6df4e484cc69bf5be6eabb968acd9d854ce34e77e3fb1aa47ef6c314885667d0419ac8c656af0bee5f64dd3872be8062a14e24

  • SSDEEP

    196608:POeipkzfuE7GiqwZy9c9UlaxsXfZmV91g2ZbJolK0xxBk:meh7upiBZy90Ul/RmauolxxTk

Malware Config

Targets

    • Target

      4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa

    • Size

      6.7MB

    • MD5

      528e717abda498c72a11370631410cad

    • SHA1

      3a41286bdc3becf2f6eb6403c71ff4cce5dd6b0d

    • SHA256

      4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa

    • SHA512

      0e054e89e39fa004580575002f6df4e484cc69bf5be6eabb968acd9d854ce34e77e3fb1aa47ef6c314885667d0419ac8c656af0bee5f64dd3872be8062a14e24

    • SSDEEP

      196608:POeipkzfuE7GiqwZy9c9UlaxsXfZmV91g2ZbJolK0xxBk:meh7upiBZy90Ul/RmauolxxTk

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v15

Tasks