General
-
Target
4378c93a35083c348931837ef6be518e7c93642b1a5d2fa140115e6998db8c9e.bin
-
Size
4.1MB
-
Sample
240826-12jwxaxgqd
-
MD5
02f8b54203644f951c8c4b5827708949
-
SHA1
3a431dd74ca00c4c894ede7dbfb880b1d62cbbd7
-
SHA256
4378c93a35083c348931837ef6be518e7c93642b1a5d2fa140115e6998db8c9e
-
SHA512
fe1bbdf68ee485e0d010075d2aeda51e298cc29064604905eb47e6fa2120b85504b1fc2e60282f93fcbebc6e38b85c5c231e4e0a1eb07b57112a1a2531a78d23
-
SSDEEP
98304:wPtaEnsjva/3TefTpBd2pMSDBHG3SZ4/iKGJn2hE:wcLyvI2fGCTKgn2W
Static task
static1
Behavioral task
behavioral1
Sample
4378c93a35083c348931837ef6be518e7c93642b1a5d2fa140115e6998db8c9e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
4378c93a35083c348931837ef6be518e7c93642b1a5d2fa140115e6998db8c9e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4378c93a35083c348931837ef6be518e7c93642b1a5d2fa140115e6998db8c9e.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
4378c93a35083c348931837ef6be518e7c93642b1a5d2fa140115e6998db8c9e.bin
-
Size
4.1MB
-
MD5
02f8b54203644f951c8c4b5827708949
-
SHA1
3a431dd74ca00c4c894ede7dbfb880b1d62cbbd7
-
SHA256
4378c93a35083c348931837ef6be518e7c93642b1a5d2fa140115e6998db8c9e
-
SHA512
fe1bbdf68ee485e0d010075d2aeda51e298cc29064604905eb47e6fa2120b85504b1fc2e60282f93fcbebc6e38b85c5c231e4e0a1eb07b57112a1a2531a78d23
-
SSDEEP
98304:wPtaEnsjva/3TefTpBd2pMSDBHG3SZ4/iKGJn2hE:wcLyvI2fGCTKgn2W
-
FluBot payload
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-