General

  • Target

    4378c93a35083c348931837ef6be518e7c93642b1a5d2fa140115e6998db8c9e.bin

  • Size

    4.1MB

  • Sample

    240826-12jwxaxgqd

  • MD5

    02f8b54203644f951c8c4b5827708949

  • SHA1

    3a431dd74ca00c4c894ede7dbfb880b1d62cbbd7

  • SHA256

    4378c93a35083c348931837ef6be518e7c93642b1a5d2fa140115e6998db8c9e

  • SHA512

    fe1bbdf68ee485e0d010075d2aeda51e298cc29064604905eb47e6fa2120b85504b1fc2e60282f93fcbebc6e38b85c5c231e4e0a1eb07b57112a1a2531a78d23

  • SSDEEP

    98304:wPtaEnsjva/3TefTpBd2pMSDBHG3SZ4/iKGJn2hE:wcLyvI2fGCTKgn2W

Malware Config

Targets

    • Target

      4378c93a35083c348931837ef6be518e7c93642b1a5d2fa140115e6998db8c9e.bin

    • Size

      4.1MB

    • MD5

      02f8b54203644f951c8c4b5827708949

    • SHA1

      3a431dd74ca00c4c894ede7dbfb880b1d62cbbd7

    • SHA256

      4378c93a35083c348931837ef6be518e7c93642b1a5d2fa140115e6998db8c9e

    • SHA512

      fe1bbdf68ee485e0d010075d2aeda51e298cc29064604905eb47e6fa2120b85504b1fc2e60282f93fcbebc6e38b85c5c231e4e0a1eb07b57112a1a2531a78d23

    • SSDEEP

      98304:wPtaEnsjva/3TefTpBd2pMSDBHG3SZ4/iKGJn2hE:wcLyvI2fGCTKgn2W

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks