General

  • Target

    e83fecae4baa2f7edf37bf398f0705d20b9946cfcc2cc7397e451d6d5ae11014.bin

  • Size

    4.8MB

  • Sample

    240826-11214axgpc

  • MD5

    7acf525b37bd716b16b905d6a57fa500

  • SHA1

    ce51de2b984ffd9ce64614efa52d2ad29547bd4e

  • SHA256

    e83fecae4baa2f7edf37bf398f0705d20b9946cfcc2cc7397e451d6d5ae11014

  • SHA512

    67b8f3b6b781c1adad0be9b9a1a2d89f4133f28a17d3a617ca8980f16fda14e2755cfe2e11a6a08d436757c3c14bbfab576a45ac9d5b5b5c72dbdca3eaae1393

  • SSDEEP

    98304:ifrlNqjQu3ltTcCysCtb/yP5JlP4cvVBzCOlx3c/BwxF3dHEB+1KBwJBRk:ifrlIlt0tTc5P5vVhCOkwf3dkYoB+g

Malware Config

Targets

    • Target

      e83fecae4baa2f7edf37bf398f0705d20b9946cfcc2cc7397e451d6d5ae11014.bin

    • Size

      4.8MB

    • MD5

      7acf525b37bd716b16b905d6a57fa500

    • SHA1

      ce51de2b984ffd9ce64614efa52d2ad29547bd4e

    • SHA256

      e83fecae4baa2f7edf37bf398f0705d20b9946cfcc2cc7397e451d6d5ae11014

    • SHA512

      67b8f3b6b781c1adad0be9b9a1a2d89f4133f28a17d3a617ca8980f16fda14e2755cfe2e11a6a08d436757c3c14bbfab576a45ac9d5b5b5c72dbdca3eaae1393

    • SSDEEP

      98304:ifrlNqjQu3ltTcCysCtb/yP5JlP4cvVBzCOlx3c/BwxF3dHEB+1KBwJBRk:ifrlIlt0tTc5P5vVhCOkwf3dkYoB+g

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks