General
-
Target
39c7ad6f0f5bea15001dfa01c337a9db44de0582d41bda87d5507c3bf453d73c.bin
-
Size
3.3MB
-
Sample
240225-1ya5laec5z
-
MD5
ba633174df329bbb08e12a8c74203306
-
SHA1
de6b3f2a977aeaaecf335de60d390056ed8d24ab
-
SHA256
39c7ad6f0f5bea15001dfa01c337a9db44de0582d41bda87d5507c3bf453d73c
-
SHA512
30f780c531ae0431c05dbe17a86fba86c8b42c479381b70cb95c777ef7a312deb50270d8db721ab475df2b2334459f87e2223406e328132887c92e56d9f4d477
-
SSDEEP
98304:YTEk6iXsxRB912taAW1CFUdl+D32whoFQO/G6:YYkyRBWDW1IUdl+7hKe6
Static task
static1
Behavioral task
behavioral1
Sample
39c7ad6f0f5bea15001dfa01c337a9db44de0582d41bda87d5507c3bf453d73c.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
39c7ad6f0f5bea15001dfa01c337a9db44de0582d41bda87d5507c3bf453d73c.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
39c7ad6f0f5bea15001dfa01c337a9db44de0582d41bda87d5507c3bf453d73c.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Targets
-
-
Target
39c7ad6f0f5bea15001dfa01c337a9db44de0582d41bda87d5507c3bf453d73c.bin
-
Size
3.3MB
-
MD5
ba633174df329bbb08e12a8c74203306
-
SHA1
de6b3f2a977aeaaecf335de60d390056ed8d24ab
-
SHA256
39c7ad6f0f5bea15001dfa01c337a9db44de0582d41bda87d5507c3bf453d73c
-
SHA512
30f780c531ae0431c05dbe17a86fba86c8b42c479381b70cb95c777ef7a312deb50270d8db721ab475df2b2334459f87e2223406e328132887c92e56d9f4d477
-
SSDEEP
98304:YTEk6iXsxRB912taAW1CFUdl+D32whoFQO/G6:YYkyRBWDW1IUdl+7hKe6
-
FluBot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-