General
-
Target
5cd1368606221b93e71740f17dc32e3d
-
Size
3.3MB
-
Sample
240115-l88raaehc9
-
MD5
5cd1368606221b93e71740f17dc32e3d
-
SHA1
ea73def168df818f7271e24c694ad76704727881
-
SHA256
26ecde3eb64a832305b3ba0599dd54d800ca58b7c5768d22543acf495347973c
-
SHA512
19c74066891810a1227c79ebf907fa50d2ddf393160306c44768b81de44adef395e11a9076bb4b86d75f3fc46d0b7a2c122cfe33ba22951622979477edb07c4c
-
SSDEEP
98304:5ELGt3ZuI7y690JAD/oD4SHXf6/LTdCHKX:5eGfuI7y2oDt4
Static task
static1
Behavioral task
behavioral1
Sample
5cd1368606221b93e71740f17dc32e3d.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
5cd1368606221b93e71740f17dc32e3d.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
5cd1368606221b93e71740f17dc32e3d.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
5cd1368606221b93e71740f17dc32e3d
-
Size
3.3MB
-
MD5
5cd1368606221b93e71740f17dc32e3d
-
SHA1
ea73def168df818f7271e24c694ad76704727881
-
SHA256
26ecde3eb64a832305b3ba0599dd54d800ca58b7c5768d22543acf495347973c
-
SHA512
19c74066891810a1227c79ebf907fa50d2ddf393160306c44768b81de44adef395e11a9076bb4b86d75f3fc46d0b7a2c122cfe33ba22951622979477edb07c4c
-
SSDEEP
98304:5ELGt3ZuI7y690JAD/oD4SHXf6/LTdCHKX:5eGfuI7y2oDt4
Score10/10-
FluBot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-