General

  • Target

    76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252

  • Size

    6.8MB

  • Sample

    231223-x1xvlagfa9

  • MD5

    7a9a3c3c37885357227fb211984bbd40

  • SHA1

    8046275ad75ef2bdbf1f21f6c64d36563d5b06f4

  • SHA256

    76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252

  • SHA512

    f854d84d80bed707e9252700cfc8dfdd53132a7a9e1db0a64fafc3b01568a7970e1d73c3a23f169a76ed709aef7b58988c2dff86281fbe0eb535bb7becdf9499

  • SSDEEP

    98304:tRrQM+PuN/1PP1DD1P7meIS64D4YC6zo4g9ZCi74Oit3Qqv5x7vnKEZ:j+WN/19DMem04Z4Tr3Qw5dnKEZ

Malware Config

Targets

    • Target

      76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252

    • Size

      6.8MB

    • MD5

      7a9a3c3c37885357227fb211984bbd40

    • SHA1

      8046275ad75ef2bdbf1f21f6c64d36563d5b06f4

    • SHA256

      76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252

    • SHA512

      f854d84d80bed707e9252700cfc8dfdd53132a7a9e1db0a64fafc3b01568a7970e1d73c3a23f169a76ed709aef7b58988c2dff86281fbe0eb535bb7becdf9499

    • SSDEEP

      98304:tRrQM+PuN/1PP1DD1P7meIS64D4YC6zo4g9ZCi74Oit3Qqv5x7vnKEZ:j+WN/19DMem04Z4Tr3Qw5dnKEZ

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v15

Tasks