General

  • Target

    f86ce60828d2fe6601b3b8c005ed543873ad6769409fc70cd1ecbe5357626f5b.bin

  • Size

    4.1MB

  • Sample

    240720-1x98asygrk

  • MD5

    4ee49e0bc3cde30139e9484d2ab73440

  • SHA1

    7e67b11ef4820f8e70581b8c1d43c2b32063b297

  • SHA256

    f86ce60828d2fe6601b3b8c005ed543873ad6769409fc70cd1ecbe5357626f5b

  • SHA512

    954f6cc847e162b66131d90a0b44d9bd9aa5e1083a118bb707c8b6400342493e20e9c934ecbb7bb821a062b71fe61d8a8b1b66cb0bc702f69e236a70f7a44472

  • SSDEEP

    98304:Dnc67bs9X7DFB2kNgRrQv0Ddnwyypk2Oxm96duI:Dnc6749XvOEqvuI

Malware Config

Targets

    • Target

      f86ce60828d2fe6601b3b8c005ed543873ad6769409fc70cd1ecbe5357626f5b.bin

    • Size

      4.1MB

    • MD5

      4ee49e0bc3cde30139e9484d2ab73440

    • SHA1

      7e67b11ef4820f8e70581b8c1d43c2b32063b297

    • SHA256

      f86ce60828d2fe6601b3b8c005ed543873ad6769409fc70cd1ecbe5357626f5b

    • SHA512

      954f6cc847e162b66131d90a0b44d9bd9aa5e1083a118bb707c8b6400342493e20e9c934ecbb7bb821a062b71fe61d8a8b1b66cb0bc702f69e236a70f7a44472

    • SSDEEP

      98304:Dnc67bs9X7DFB2kNgRrQv0Ddnwyypk2Oxm96duI:Dnc6749XvOEqvuI

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks