General
-
Target
e83fecae4baa2f7edf37bf398f0705d20b9946cfcc2cc7397e451d6d5ae11014.bin
-
Size
4.8MB
-
Sample
240826-11214axgpc
-
MD5
7acf525b37bd716b16b905d6a57fa500
-
SHA1
ce51de2b984ffd9ce64614efa52d2ad29547bd4e
-
SHA256
e83fecae4baa2f7edf37bf398f0705d20b9946cfcc2cc7397e451d6d5ae11014
-
SHA512
67b8f3b6b781c1adad0be9b9a1a2d89f4133f28a17d3a617ca8980f16fda14e2755cfe2e11a6a08d436757c3c14bbfab576a45ac9d5b5b5c72dbdca3eaae1393
-
SSDEEP
98304:ifrlNqjQu3ltTcCysCtb/yP5JlP4cvVBzCOlx3c/BwxF3dHEB+1KBwJBRk:ifrlIlt0tTc5P5vVhCOkwf3dkYoB+g
Static task
static1
Behavioral task
behavioral1
Sample
e83fecae4baa2f7edf37bf398f0705d20b9946cfcc2cc7397e451d6d5ae11014.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
e83fecae4baa2f7edf37bf398f0705d20b9946cfcc2cc7397e451d6d5ae11014.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
e83fecae4baa2f7edf37bf398f0705d20b9946cfcc2cc7397e451d6d5ae11014.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
e83fecae4baa2f7edf37bf398f0705d20b9946cfcc2cc7397e451d6d5ae11014.bin
-
Size
4.8MB
-
MD5
7acf525b37bd716b16b905d6a57fa500
-
SHA1
ce51de2b984ffd9ce64614efa52d2ad29547bd4e
-
SHA256
e83fecae4baa2f7edf37bf398f0705d20b9946cfcc2cc7397e451d6d5ae11014
-
SHA512
67b8f3b6b781c1adad0be9b9a1a2d89f4133f28a17d3a617ca8980f16fda14e2755cfe2e11a6a08d436757c3c14bbfab576a45ac9d5b5b5c72dbdca3eaae1393
-
SSDEEP
98304:ifrlNqjQu3ltTcCysCtb/yP5JlP4cvVBzCOlx3c/BwxF3dHEB+1KBwJBRk:ifrlIlt0tTc5P5vVhCOkwf3dkYoB+g
-
FluBot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-
Requests changing the default SMS application.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1