General
-
Target
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252
-
Size
6.8MB
-
Sample
231223-x1xvlagfa9
-
MD5
7a9a3c3c37885357227fb211984bbd40
-
SHA1
8046275ad75ef2bdbf1f21f6c64d36563d5b06f4
-
SHA256
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252
-
SHA512
f854d84d80bed707e9252700cfc8dfdd53132a7a9e1db0a64fafc3b01568a7970e1d73c3a23f169a76ed709aef7b58988c2dff86281fbe0eb535bb7becdf9499
-
SSDEEP
98304:tRrQM+PuN/1PP1DD1P7meIS64D4YC6zo4g9ZCi74Oit3Qqv5x7vnKEZ:j+WN/19DMem04Z4Tr3Qw5dnKEZ
Static task
static1
Behavioral task
behavioral1
Sample
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252
-
Size
6.8MB
-
MD5
7a9a3c3c37885357227fb211984bbd40
-
SHA1
8046275ad75ef2bdbf1f21f6c64d36563d5b06f4
-
SHA256
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252
-
SHA512
f854d84d80bed707e9252700cfc8dfdd53132a7a9e1db0a64fafc3b01568a7970e1d73c3a23f169a76ed709aef7b58988c2dff86281fbe0eb535bb7becdf9499
-
SSDEEP
98304:tRrQM+PuN/1PP1DD1P7meIS64D4YC6zo4g9ZCi74Oit3Qqv5x7vnKEZ:j+WN/19DMem04Z4Tr3Qw5dnKEZ
Score10/10-
FluBot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-