General

  • Target

    957900b7bc1a116f32ba731adc076e44c4be62612071c430b67d478628dcdca4.bin

  • Size

    3.2MB

  • Sample

    240807-1zn3vaycna

  • MD5

    ae96f02aa025919dc4d1ef3d72249484

  • SHA1

    dbda147735afcfd333b47919aeca481d998a3a50

  • SHA256

    957900b7bc1a116f32ba731adc076e44c4be62612071c430b67d478628dcdca4

  • SHA512

    e889abd13855da39f6a90e3834034fec6d1575bef36510ee3bebae5698f56bd845a782e6087d5d53ea4bfc3b5821579b071e4409079e85b62a2013af1e92cdfd

  • SSDEEP

    98304:yElBNzfMAf9mdOtZ34tVpvbPIAR9XAU5LfE9c:p/wOYtVlbPIAnAQMW

Malware Config

Targets

    • Target

      957900b7bc1a116f32ba731adc076e44c4be62612071c430b67d478628dcdca4.bin

    • Size

      3.2MB

    • MD5

      ae96f02aa025919dc4d1ef3d72249484

    • SHA1

      dbda147735afcfd333b47919aeca481d998a3a50

    • SHA256

      957900b7bc1a116f32ba731adc076e44c4be62612071c430b67d478628dcdca4

    • SHA512

      e889abd13855da39f6a90e3834034fec6d1575bef36510ee3bebae5698f56bd845a782e6087d5d53ea4bfc3b5821579b071e4409079e85b62a2013af1e92cdfd

    • SSDEEP

      98304:yElBNzfMAf9mdOtZ34tVpvbPIAR9XAU5LfE9c:p/wOYtVlbPIAnAQMW

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks