General
-
Target
8c9d7345935d46c1602936934b600bb55fa6127cbdefd343ad5ebf03114dbe45.7z
-
Size
5.3MB
-
Sample
240118-jyb88agca5
-
MD5
8d356d4176bd812c7080973ee9ef39c6
-
SHA1
2ba7c51c3766db8017845240dbac63e15d667f0a
-
SHA256
460f82e3ae566f5334d21205d57e5b5b5bef28bacae5e8aa9e8e7befd525003a
-
SHA512
d17531a84c17d7149b2822ac884eb216c183d17d71f4f2ed10c62f11d0569f280820d080955a6b107e04c1e6ecc3e8e13866b0a7272032d67f0ecf3e109e8e63
-
SSDEEP
98304:1IWQ7AYpaWOxCfbx7YpR7S5G3Bd5vn/tjFIw2YxnhCH3vowQcWiPWF:1kcRWO8g33r5vnVhVXAvnbWiPWF
Static task
static1
Behavioral task
behavioral1
Sample
8c9d7345935d46c1602936934b600bb55fa6127cbdefd343ad5ebf03114dbe45.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral2
Sample
vk_dex.apk
Resource
android-x64-20231215-en
Malware Config
Targets
-
-
Target
8c9d7345935d46c1602936934b600bb55fa6127cbdefd343ad5ebf03114dbe45
-
Size
5.5MB
-
MD5
90960e63a4d5a871f2f5617f6e26c382
-
SHA1
efe3f8785f17d1add3642a2607ef346ea9bbf962
-
SHA256
8c9d7345935d46c1602936934b600bb55fa6127cbdefd343ad5ebf03114dbe45
-
SHA512
b781b2a3882bbf2a86c6759be88a69a9260363f5d47c1da963946bf0d82c86de30edd1ca6b05f861aa4e828f5d0ff0e8a7b71b931ce00f031244b59be1d323bd
-
SSDEEP
98304:2x2natN0Gwuybg0chHxA/PfECifHyUiCAnBT7rXxrZSFES2PHsQMnZvgnfe3W3S7:2x9735ypcJxA/oLArFSqPHsQMAe3P7
Score10/10-
FluBot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
-
-
Target
vk_dex.apk
-
Size
106KB
-
MD5
bc185a98eeb3c6854c2caa633295fa3b
-
SHA1
cf0b10d87d8d6459ae5b74483d7020dd496800e1
-
SHA256
da37cf4de83a645e1b3241879abe4a9e1a2fdb8a5e3f8bbe634509ac660a480d
-
SHA512
5bb4bb3aaabf3fa44260c4aec4925fd60901eaf9be83ae661bbb013ca976dc9c4c5d2debea76fc8779ecbd01cf63221b8b6be9951139a972a3b82c92c0fc1c85
-
SSDEEP
3072:nQnd9yPnoYlod2kB2zYrp42EUzHGSPIyPzKEmOZPGk9Nt:ywnblhW28ru2kSPIyPz7Gk9L
Score1/10 -