General

  • Target

    06b523da0f9d2d52ddf3b2c76a8be5e4084bd921e363b36c7e3bb3c456aa5a39

  • Size

    3.9MB

  • Sample

    240126-w61b8sbhf3

  • MD5

    2a0df65d94ec05fcd635ff6f1dd413e4

  • SHA1

    9db282665315e2ac6a81631428d8db5d464d6364

  • SHA256

    06b523da0f9d2d52ddf3b2c76a8be5e4084bd921e363b36c7e3bb3c456aa5a39

  • SHA512

    ce5b71f643c8ddfd0c83fed37f740a2e7f75819abaa46092c4409de1f19fc8129a0b8f9b3e79f51f83330243179ca8ffdc8f1346694f70241718afa6ccccca3f

  • SSDEEP

    98304:/gkW89iS413fkXCl96rK8r9nG/UD3MnjTdTWeutF+6WBaT86h4sQTr:/NW892czK8RnrcjvACBaTNh4f

Malware Config

Targets

    • Target

      06b523da0f9d2d52ddf3b2c76a8be5e4084bd921e363b36c7e3bb3c456aa5a39

    • Size

      3.9MB

    • MD5

      2a0df65d94ec05fcd635ff6f1dd413e4

    • SHA1

      9db282665315e2ac6a81631428d8db5d464d6364

    • SHA256

      06b523da0f9d2d52ddf3b2c76a8be5e4084bd921e363b36c7e3bb3c456aa5a39

    • SHA512

      ce5b71f643c8ddfd0c83fed37f740a2e7f75819abaa46092c4409de1f19fc8129a0b8f9b3e79f51f83330243179ca8ffdc8f1346694f70241718afa6ccccca3f

    • SSDEEP

      98304:/gkW89iS413fkXCl96rK8r9nG/UD3MnjTdTWeutF+6WBaT86h4sQTr:/NW892czK8RnrcjvACBaTNh4f

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix ATT&CK v13

Tasks