General

  • Target

    891d5d2c397e9ad5fed5685f78657d4b_JaffaCakes118

  • Size

    4.6MB

  • Sample

    240402-lm1tjsda2x

  • MD5

    891d5d2c397e9ad5fed5685f78657d4b

  • SHA1

    f2f3f6344e054a03cd83e2e2f00af2af3d59f1c5

  • SHA256

    ea6776fac45c8844242fdb566a17e70569813298235567bbe9fa0dd062f1160b

  • SHA512

    369875e4359b91936f015d347be0f765ffdfddb92c82d887d3cbe07c38dacc0029b25f38682f270700feaa62d728ccf42ccd95362785f7c2119ae43e74d2ac49

  • SSDEEP

    98304:UHIuiDQ9wfSVdDp6gDkTjhJfB5oxlAuEk0Olk0mYjFpfYgQ+Q67D2t:Uor4pVZp6PjbfskXX+3PQd67O

Malware Config

Targets

    • Target

      891d5d2c397e9ad5fed5685f78657d4b_JaffaCakes118

    • Size

      4.6MB

    • MD5

      891d5d2c397e9ad5fed5685f78657d4b

    • SHA1

      f2f3f6344e054a03cd83e2e2f00af2af3d59f1c5

    • SHA256

      ea6776fac45c8844242fdb566a17e70569813298235567bbe9fa0dd062f1160b

    • SHA512

      369875e4359b91936f015d347be0f765ffdfddb92c82d887d3cbe07c38dacc0029b25f38682f270700feaa62d728ccf42ccd95362785f7c2119ae43e74d2ac49

    • SSDEEP

      98304:UHIuiDQ9wfSVdDp6gDkTjhJfB5oxlAuEk0Olk0mYjFpfYgQ+Q67D2t:Uor4pVZp6PjbfskXX+3PQd67O

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks