General

  • Target

    189f3eb2f75106a7f9416b1a92800c9f

  • Size

    3.0MB

  • Sample

    231224-277qlaceg2

  • MD5

    189f3eb2f75106a7f9416b1a92800c9f

  • SHA1

    82fbc3c640aee29b8dc0e6a9c88b0eb450b25556

  • SHA256

    f1cd0e742102754233bf83ffbb718b3c4c830a603e41cd1090b9cba5331a1933

  • SHA512

    3e1cb82b714ae058666453c45b899d4af5de33ee7e486f33c27ae716afcbaf5a657386969ad5a5053c6666e4504c26f8a2c7e88b000f5debcb97f91afed13920

  • SSDEEP

    49152:KKXXByEPmieQpAkKKhMpMbKm1SzoNrxHauzZ6Fe5K+xmXzoJgNw9wn3aQQS:K+yE5eQpZh32zojHauF4eY+B9RBS

Malware Config

Targets

    • Target

      189f3eb2f75106a7f9416b1a92800c9f

    • Size

      3.0MB

    • MD5

      189f3eb2f75106a7f9416b1a92800c9f

    • SHA1

      82fbc3c640aee29b8dc0e6a9c88b0eb450b25556

    • SHA256

      f1cd0e742102754233bf83ffbb718b3c4c830a603e41cd1090b9cba5331a1933

    • SHA512

      3e1cb82b714ae058666453c45b899d4af5de33ee7e486f33c27ae716afcbaf5a657386969ad5a5053c6666e4504c26f8a2c7e88b000f5debcb97f91afed13920

    • SSDEEP

      49152:KKXXByEPmieQpAkKKhMpMbKm1SzoNrxHauzZ6Fe5K+xmXzoJgNw9wn3aQQS:K+yE5eQpZh32zojHauF4eY+B9RBS

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix ATT&CK v13

Tasks